Arachni - Web Application Security Scanner Framework v1.1 Author: Tasos "Zapotek" Laskos (With the support of the community and the Arachni Team.) Website: http://arachni-scanner.com Documentation: http://arachni-scanner.com/wiki [~] No element audit options were specified, will audit links, forms, cookies, JSONs and XMLs. [*] Initializing... [*] Preparing plugins... [*] ... done. [~] AutoLogin: System paused. [!] Browser: Spawning PhantomJS... [!] Browser: Attempt #0, chose port number 2023 [!] Browser: Spawning process: /home/amar/work/tools/arachni-1.1-0.5.7/bin/../system/usr/bin/phantomjs [!] Browser: Process spawned, waiting for it to boot-up... [!] Browser: Boot-up complete. [!] Browser: Fontconfig error: Cannot load default config file 2015-05-05T12:09:28 [DEBUG] CookieJar - Created but will not store cookies (use option '--cookies-file=' to enable persisten cookie storage) 2015-05-05T12:09:28 [DEBUG] Phantom - execute: Configuration 2015-05-05T12:09:28 [DEBUG] 0 objectName : "" 2015-05-05T12:09:28 [DEBUG] 1 cookiesFile : "" 2015-05-05T12:09:28 [DEBUG] 2 diskCacheEnabled : "true" 2015-05-05T12:09:28 [DEBUG] 3 maxDiskCacheSize : "-1" 2015-05-05T12:09:28 [DEBUG] 4 ignoreSslErrors : "true" 2015-05-05T12:09:28 [DEBUG] 5 localToRemoteUrlAccessEnabled : "false" 2015-05-05T12:09:28 [DEBUG] 6 outputEncoding : "UTF-8" 2015-05-05T12:09:28 [DEBUG] 7 proxyType : "http" 2015-05-05T12:09:28 [DEBUG] 8 proxy : "127.0.0.1:52640" 2015-05-05T12:09:28 [DEBUG] 9 proxyAuth : ":" 2015-05-05T12:09:28 [DEBUG] 10 scriptEncoding : "UTF-8" 2015-05-05T12:09:28 [DEBUG] 11 webSecurityEnabled : "true" 2015-05-05T12:09:28 [DEBUG] 12 offlineStoragePath : "" 2015-05-05T12:09:28 [DEBUG] 13 offlineStorageDefaultQuota : "-1" 2015-05-05T12:09:28 [DEBUG] 14 printDebugMessages : "true" 2015-05-05T12:09:28 [DEBUG] 15 javascriptCanOpenWindows : "true" 2015-05-05T12:09:28 [DEBUG] 16 javascriptCanCloseWindows : "true" 2015-05-05T12:09:28 [DEBUG] 17 sslProtocol : "sslv3" 2015-05-05T12:09:28 [DEBUG] 18 sslCertificatesPath : "" 2015-05-05T12:09:28 [DEBUG] 19 webdriver : ":2023" 2015-05-05T12:09:28 [DEBUG] 20 webdriverLogFile : "" 2015-05-05T12:09:28 [DEBUG] 21 webdriverLogLevel : "INFO" 2015-05-05T12:09:28 [DEBUG] 22 webdriverSeleniumGridHub : "" 2015-05-05T12:09:28 [DEBUG] Phantom - execute: Script & Arguments 2015-05-05T12:09:28 [DEBUG] script: "main.js" 2015-05-05T12:09:28 [DEBUG] 0 arg: "--ip=" 2015-05-05T12:09:28 [DEBUG] 1 arg: "--port=2023" 2015-05-05T12:09:28 [DEBUG] 2 arg: "--logLevel=INFO" 2015-05-05T12:09:28 [DEBUG] Phantom - execute: Starting Remote WebDriver mode PhantomJS is launching GhostDriver... 2015-05-05T12:09:28 [DEBUG] WebPage - setupFrame "" 2015-05-05T12:09:28 [DEBUG] FileSystem - _open: ":/modules/fs.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:09:28 [DEBUG] FileSystem - _open: ":/modules/system.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:09:28 [DEBUG] FileSystem - _open: ":/modules/webpage.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:09:28 [DEBUG] FileSystem - _open: ":/modules/webserver.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:09:28 [DEBUG] FileSystem - _open: ":/ghostdriver/./hub_register.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:09:28 [DEBUG] FileSystem - _open: ":/ghostdriver/./logger.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:09:28 [DEBUG] FileSystem - _open: ":/ghostdriver/./third_party/console++.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:09:28 [DEBUG] FileSystem - _open: ":/ghostdriver/./config.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:09:28 [DEBUG] FileSystem - _open: ":/ghostdriver/./third_party/parseuri.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: "session.js" 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: "inputs.js" 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: "request_handlers/request_handler.js" 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: "request_handlers/status_request_handler.js" 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:09:28 [DEBUG] FileSystem - _open: ":/ghostdriver/./errors.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: "request_handlers/shutdown_request_handler.js" 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: "request_handlers/session_manager_request_handler.js" 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: "request_handlers/session_request_handler.js" 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: "request_handlers/webelement_request_handler.js" 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: "request_handlers/router_request_handler.js" 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: "webelementlocator.js" 2015-05-05T12:09:28 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" [INFO - 2015-05-05T19:09:28.495Z] GhostDriver - Main - running on port 2023 [!] Browser: PhantomJS is ready. [!] Session: Logging in via configuration. [!] Session: Logging in using browser. [!] Session: Grabbing page at: https://myserver/mypath/navigate?menuID=default [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 0 [!] Client: Performer: # [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"User-Agent"=>"Arachni/v1.1", "Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 0 [!] Client: Performer: # [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=7C99150D9B7239E3B0C0B4255B61FE3C; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:09:12 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=7C99150D9B7239E3B0C0B4255B61FE3C; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:09:12 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 1 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/yui3/build/cssreset/reset-min.css [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"866-1427851526000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:26 GMT", "User-Agent"=>"Arachni/v1.1", "Accept"=>"text/css,*/*;q=0.1", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=7C99150D9B7239E3B0C0B4255B61FE3C", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 1 [!] Client: Performer: # [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/yui3/build/cssreset/reset-min.css [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:09:13 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"866-1427851526000" Date: Wed, 06 May 2015 18:09:12 GMT [!] Client: Queued request. [!] Client: ID#: 2 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/yui3/build/cssgrids/grids-min.css [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"1465-1427851526000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:26 GMT", "User-Agent"=>"Arachni/v1.1", "Accept"=>"text/css,*/*;q=0.1", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=7C99150D9B7239E3B0C0B4255B61FE3C", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:09:13 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"866-1427851526000\"", "Date"=>"Wed, 06 May 2015 18:09:12 GMT"} [!] Client: ------------ [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 2 [!] Client: Performer: # [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/yui3/build/cssgrids/grids-min.css [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:09:13 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"1465-1427851526000" Date: Wed, 06 May 2015 18:09:12 GMT [!] Client: Queued request. [!] Client: ID#: 3 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/content.css [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"8425-1427851520000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:20 GMT", "User-Agent"=>"Arachni/v1.1", "Accept"=>"text/css,*/*;q=0.1", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=7C99150D9B7239E3B0C0B4255B61FE3C", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:09:13 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"1465-1427851526000\"", "Date"=>"Wed, 06 May 2015 18:09:12 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 4 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/containers.css [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"6687-1427851520000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:20 GMT", "User-Agent"=>"Arachni/v1.1", "Accept"=>"text/css,*/*;q=0.1", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=7C99150D9B7239E3B0C0B4255B61FE3C", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 3 [!] Client: Performer: # [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/content.css [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:09:13 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"8425-1427851520000" Date: Wed, 06 May 2015 18:09:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:09:13 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"8425-1427851520000\"", "Date"=>"Wed, 06 May 2015 18:09:13 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 4 [!] Client: Performer: # [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/containers.css [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:09:13 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"6687-1427851520000" Date: Wed, 06 May 2015 18:09:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:09:13 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"6687-1427851520000\"", "Date"=>"Wed, 06 May 2015 18:09:13 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 5 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/layouts.css [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"2165-1427851520000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:20 GMT", "User-Agent"=>"Arachni/v1.1", "Accept"=>"text/css,*/*;q=0.1", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=7C99150D9B7239E3B0C0B4255B61FE3C", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 6 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/js/jquery/jquery-2.0.3.min.js [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"83618-1427851522000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:22 GMT", "User-Agent"=>"Arachni/v1.1", "Accept"=>"*/*", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=7C99150D9B7239E3B0C0B4255B61FE3C", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 5 [!] Client: Performer: # [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/layouts.css [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:09:14 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"2165-1427851520000" Date: Wed, 06 May 2015 18:09:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:09:14 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"2165-1427851520000\"", "Date"=>"Wed, 06 May 2015 18:09:13 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 7 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/pagecss/Logon.jsp.css [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"859-1427851520000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:20 GMT", "User-Agent"=>"Arachni/v1.1", "Accept"=>"text/css,*/*;q=0.1", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=7C99150D9B7239E3B0C0B4255B61FE3C", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 6 [!] Client: Performer: # [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/js/jquery/jquery-2.0.3.min.js [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:09:14 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"83618-1427851522000" Date: Wed, 06 May 2015 18:09:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:09:14 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"83618-1427851522000\"", "Date"=>"Wed, 06 May 2015 18:09:13 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 7 [!] Client: Performer: # [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/pagecss/Logon.jsp.css [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:09:14 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"859-1427851520000" Date: Wed, 06 May 2015 18:09:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:09:14 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"859-1427851520000\"", "Date"=>"Wed, 06 May 2015 18:09:13 GMT"} [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 8 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/js/logon.js [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"1381-1427851524000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:24 GMT", "User-Agent"=>"Arachni/v1.1", "Accept"=>"*/*", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=7C99150D9B7239E3B0C0B4255B61FE3C", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 9 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/servlet/l10n/css/overrides.css [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"User-Agent"=>"Arachni/v1.1", "Accept"=>"text/css,*/*;q=0.1", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=7C99150D9B7239E3B0C0B4255B61FE3C", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 8 [!] Client: Performer: # [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/js/logon.js [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:09:15 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"1381-1427851524000" Date: Wed, 06 May 2015 18:09:15 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:09:15 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"1381-1427851524000\"", "Date"=>"Wed, 06 May 2015 18:09:15 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ------------ [!] Client: ID#: 10 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/graphics/page-background.png [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"3889-1427851520000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:20 GMT", "User-Agent"=>"Arachni/v1.1", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Accept"=>"*/*", "Cookie"=>"JSESSIONID=7C99150D9B7239E3B0C0B4255B61FE3C", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: Got response for request ID#: 9 [!] Client: Performer: # [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/servlet/l10n/css/overrides.css [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Thu, 01 Jan 1970 00:00:00 GMT Pragma: no-cache Cache-Control: no-cache Content-Type: text/css Content-Length: 240 Date: Wed, 06 May 2015 18:09:15 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Pragma"=>"no-cache", "Cache-Control"=>"no-cache", "Content-Type"=>"text/css", "Content-Length"=>"240", "Date"=>"Wed, 06 May 2015 18:09:15 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 11 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/graphics/general/HL_DLPLogin.png [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"21616-1427851520000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:20 GMT", "User-Agent"=>"Arachni/v1.1", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Accept"=>"*/*", "Cookie"=>"JSESSIONID=7C99150D9B7239E3B0C0B4255B61FE3C", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 10 [!] Client: Performer: # [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/graphics/page-background.png [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:09:15 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"3889-1427851520000" Date: Wed, 06 May 2015 18:09:15 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:09:15 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"3889-1427851520000\"", "Date"=>"Wed, 06 May 2015 18:09:15 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 11 [!] Client: Performer: # [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/graphics/general/HL_DLPLogin.png [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:09:15 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"21616-1427851520000" Date: Wed, 06 May 2015 18:09:15 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:09:15 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"21616-1427851520000\"", "Date"=>"Wed, 06 May 2015 18:09:15 GMT"} [!] Client: ------------ [!] Session: Got page with URL https://myserver/mypath/navigate?menuID=default [!] Session: Found login form: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] Session: Updated form inputs: {"username"=>"Administrator", "j_username"=>"Administrator", "j_password"=>"mypasswd"} [!] Session: Submitting form. [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 12 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/servlet/l10n/css/overrides.css [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"User-Agent"=>"Arachni/v1.1", "Accept"=>"text/css,*/*;q=0.1", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=7C99150D9B7239E3B0C0B4255B61FE3C", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 12 [!] Client: Performer: # [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/servlet/l10n/css/overrides.css [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Thu, 01 Jan 1970 00:00:00 GMT Pragma: no-cache Cache-Control: no-cache Content-Type: text/css Content-Length: 240 Date: Wed, 06 May 2015 18:09:26 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Pragma"=>"no-cache", "Cache-Control"=>"no-cache", "Content-Type"=>"text/css", "Content-Length"=>"240", "Date"=>"Wed, 06 May 2015 18:09:26 GMT"} [!] Client: ------------ [!] Browser: Loaded snapshot by URL: https://myserver/mypath/navigate?menuID=default [!] Browser: fire_event [start]: submit ({:inputs=>{"username"=>"Administrator", "j_username"=>"Administrator", "j_password"=>"mypasswd"}})
[!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 13 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: username=Administrator&j_username=&j_password=mypasswd [!] Client: Headers: {"Origin"=>"https://myserver", "User-Agent"=>"Arachni/v1.1", "Content-Type"=>"application/x-www-form-urlencoded", "Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=7C99150D9B7239E3B0C0B4255B61FE3C", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 13 [!] Client: Performer: # [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:09:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:09:40 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 14 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/js/globalDialog.js [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"348-1427851522000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:22 GMT", "User-Agent"=>"Arachni/v1.1", "Accept"=>"*/*", "Referer"=>"https://myserver/Manager/j_security_check", "Cookie"=>"JSESSIONID=7C99150D9B7239E3B0C0B4255B61FE3C", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 15 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/servlet/l10n/css/overrides.css [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"User-Agent"=>"Arachni/v1.1", "Accept"=>"text/css,*/*;q=0.1", "Referer"=>"https://myserver/Manager/j_security_check", "Cookie"=>"JSESSIONID=7C99150D9B7239E3B0C0B4255B61FE3C", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 14 [!] Client: Performer: # [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/js/globalDialog.js [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:09:41 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"348-1427851522000" Date: Wed, 06 May 2015 18:09:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:09:41 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"348-1427851522000\"", "Date"=>"Wed, 06 May 2015 18:09:40 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 15 [!] Client: Performer: # [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/servlet/l10n/css/overrides.css [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Thu, 01 Jan 1970 00:00:00 GMT Pragma: no-cache Cache-Control: no-cache Content-Type: text/css Content-Length: 240 Date: Wed, 06 May 2015 18:09:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Pragma"=>"no-cache", "Cache-Control"=>"no-cache", "Content-Type"=>"text/css", "Content-Length"=>"240", "Date"=>"Wed, 06 May 2015 18:09:40 GMT"} [!] Client: ------------ [!] Browser: fire_event [waiting for requests]: submit ({:inputs=>{"username"=>"Administrator", "j_username"=>"Administrator", "j_password"=>"mypasswd"}}) [!] Browser: fire_event [done waiting for requests]: submit ({:inputs=>{"username"=>"Administrator", "j_username"=>"Administrator", "j_password"=>"mypasswd"}}) [!] Browser: fire_event [done]: submit ({:inputs=>{"username"=>"Administrator", "j_username"=>"Administrator", "j_password"=>"mypasswd"}}) [!] Session: Form submitted. [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 16 [!] Client: Performer: nil [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C"} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 16 [!] Client: Performer: nil [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:09:51 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:09:51 GMT", "Connection"=>"close"} [!] Client: ------------ [+] AutoLogin: Form submitted successfully. [~] AutoLogin: Cookies set to: [~] AutoLogin: * "JSESSIONID" = "7C99150D9B7239E3B0C0B4255B61FE3C" [*] BrowserCluster: Initializing 6 browsers... [!] BrowserCluster Worker#86888910: Spawning PhantomJS... [!] BrowserCluster Worker#86888910: Attempt #0, chose port number 47189 [!] BrowserCluster Worker#86888910: Spawning process: /home/amar/work/tools/arachni-1.1-0.5.7/bin/../system/usr/bin/phantomjs [!] BrowserCluster Worker#86888910: Process spawned, waiting for it to boot-up... [!] BrowserCluster Worker#86888910: Boot-up complete. [!] BrowserCluster Worker#86888910: Fontconfig error: Cannot load default config file 2015-05-05T12:10:08 [DEBUG] CookieJar - Created but will not store cookies (use option '--cookies-file=' to enable persisten cookie storage) 2015-05-05T12:10:08 [DEBUG] Phantom - execute: Configuration 2015-05-05T12:10:08 [DEBUG] 0 objectName : "" 2015-05-05T12:10:08 [DEBUG] 1 cookiesFile : "" 2015-05-05T12:10:08 [DEBUG] 2 diskCacheEnabled : "true" 2015-05-05T12:10:08 [DEBUG] 3 maxDiskCacheSize : "-1" 2015-05-05T12:10:08 [DEBUG] 4 ignoreSslErrors : "true" 2015-05-05T12:10:08 [DEBUG] 5 localToRemoteUrlAccessEnabled : "false" 2015-05-05T12:10:08 [DEBUG] 6 outputEncoding : "UTF-8" 2015-05-05T12:10:08 [DEBUG] 7 proxyType : "http" 2015-05-05T12:10:08 [DEBUG] 8 proxy : "127.0.0.1:37636" 2015-05-05T12:10:08 [DEBUG] 9 proxyAuth : ":" 2015-05-05T12:10:08 [DEBUG] 10 scriptEncoding : "UTF-8" 2015-05-05T12:10:08 [DEBUG] 11 webSecurityEnabled : "true" 2015-05-05T12:10:08 [DEBUG] 12 offlineStoragePath : "" 2015-05-05T12:10:08 [DEBUG] 13 offlineStorageDefaultQuota : "-1" 2015-05-05T12:10:08 [DEBUG] 14 printDebugMessages : "true" 2015-05-05T12:10:08 [DEBUG] 15 javascriptCanOpenWindows : "true" 2015-05-05T12:10:08 [DEBUG] 16 javascriptCanCloseWindows : "true" 2015-05-05T12:10:08 [DEBUG] 17 sslProtocol : "sslv3" 2015-05-05T12:10:08 [DEBUG] 18 sslCertificatesPath : "" 2015-05-05T12:10:08 [DEBUG] 19 webdriver : ":47189" 2015-05-05T12:10:08 [DEBUG] 20 webdriverLogFile : "" 2015-05-05T12:10:08 [DEBUG] 21 webdriverLogLevel : "INFO" 2015-05-05T12:10:08 [DEBUG] 22 webdriverSeleniumGridHub : "" 2015-05-05T12:10:08 [DEBUG] Phantom - execute: Script & Arguments 2015-05-05T12:10:08 [DEBUG] script: "main.js" 2015-05-05T12:10:08 [DEBUG] 0 arg: "--ip=" 2015-05-05T12:10:08 [DEBUG] 1 arg: "--port=47189" 2015-05-05T12:10:08 [DEBUG] 2 arg: "--logLevel=INFO" 2015-05-05T12:10:08 [DEBUG] Phantom - execute: Starting Remote WebDriver mode PhantomJS is launching GhostDriver... 2015-05-05T12:10:08 [DEBUG] WebPage - setupFrame "" 2015-05-05T12:10:08 [DEBUG] FileSystem - _open: ":/modules/fs.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:08 [DEBUG] FileSystem - _open: ":/modules/system.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:08 [DEBUG] FileSystem - _open: ":/modules/webpage.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:08 [DEBUG] FileSystem - _open: ":/modules/webserver.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:08 [DEBUG] FileSystem - _open: ":/ghostdriver/./hub_register.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:08 [DEBUG] FileSystem - _open: ":/ghostdriver/./logger.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:08 [DEBUG] FileSystem - _open: ":/ghostdriver/./third_party/console++.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:08 [DEBUG] FileSystem - _open: ":/ghostdriver/./config.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:08 [DEBUG] FileSystem - _open: ":/ghostdriver/./third_party/parseuri.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: "session.js" 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: "inputs.js" 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: "request_handlers/request_handler.js" 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: "request_handlers/status_request_handler.js" 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:08 [DEBUG] FileSystem - _open: ":/ghostdriver/./errors.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: "request_handlers/shutdown_request_handler.js" 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: "request_handlers/session_manager_request_handler.js" 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: "request_handlers/session_request_handler.js" 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: "request_handlers/webelement_request_handler.js" 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: "request_handlers/router_request_handler.js" 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: "webelementlocator.js" 2015-05-05T12:10:08 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" [INFO - 2015-05-05T19:10:08.843Z] GhostDriver - Main - running on port 47189 [!] BrowserCluster Worker#86888910: PhantomJS is ready. [*] BrowserCluster: Spawned #1 with PID 31690. [!] BrowserCluster Worker#86888910: Spawning PhantomJS... [!] BrowserCluster Worker#86888910: Attempt #0, chose port number 59085 [!] BrowserCluster Worker#86888910: Spawning process: /home/amar/work/tools/arachni-1.1-0.5.7/bin/../system/usr/bin/phantomjs [!] BrowserCluster Worker#86888910: Process spawned, waiting for it to boot-up... [!] BrowserCluster Worker#86888910: Boot-up complete. [!] BrowserCluster Worker#86888910: Fontconfig error: Cannot load default config file 2015-05-05T12:10:09 [DEBUG] CookieJar - Created but will not store cookies (use option '--cookies-file=' to enable persisten cookie storage) 2015-05-05T12:10:09 [DEBUG] Phantom - execute: Configuration 2015-05-05T12:10:09 [DEBUG] 0 objectName : "" 2015-05-05T12:10:09 [DEBUG] 1 cookiesFile : "" 2015-05-05T12:10:09 [DEBUG] 2 diskCacheEnabled : "true" 2015-05-05T12:10:09 [DEBUG] 3 maxDiskCacheSize : "-1" 2015-05-05T12:10:09 [DEBUG] 4 ignoreSslErrors : "true" 2015-05-05T12:10:09 [DEBUG] 5 localToRemoteUrlAccessEnabled : "false" 2015-05-05T12:10:09 [DEBUG] 6 outputEncoding : "UTF-8" 2015-05-05T12:10:09 [DEBUG] 7 proxyType : "http" 2015-05-05T12:10:09 [DEBUG] 8 proxy : "127.0.0.1:4244" 2015-05-05T12:10:09 [DEBUG] 9 proxyAuth : ":" 2015-05-05T12:10:09 [DEBUG] 10 scriptEncoding : "UTF-8" 2015-05-05T12:10:09 [DEBUG] 11 webSecurityEnabled : "true" 2015-05-05T12:10:09 [DEBUG] 12 offlineStoragePath : "" 2015-05-05T12:10:09 [DEBUG] 13 offlineStorageDefaultQuota : "-1" 2015-05-05T12:10:09 [DEBUG] 14 printDebugMessages : "true" 2015-05-05T12:10:09 [DEBUG] 15 javascriptCanOpenWindows : "true" 2015-05-05T12:10:09 [DEBUG] 16 javascriptCanCloseWindows : "true" 2015-05-05T12:10:09 [DEBUG] 17 sslProtocol : "sslv3" 2015-05-05T12:10:09 [DEBUG] 18 sslCertificatesPath : "" 2015-05-05T12:10:09 [DEBUG] 19 webdriver : ":59085" 2015-05-05T12:10:09 [DEBUG] 20 webdriverLogFile : "" 2015-05-05T12:10:09 [DEBUG] 21 webdriverLogLevel : "INFO" 2015-05-05T12:10:09 [DEBUG] 22 webdriverSeleniumGridHub : "" 2015-05-05T12:10:09 [DEBUG] Phantom - execute: Script & Arguments 2015-05-05T12:10:09 [DEBUG] script: "main.js" 2015-05-05T12:10:09 [DEBUG] 0 arg: "--ip=" 2015-05-05T12:10:09 [DEBUG] 1 arg: "--port=59085" 2015-05-05T12:10:09 [DEBUG] 2 arg: "--logLevel=INFO" 2015-05-05T12:10:09 [DEBUG] Phantom - execute: Starting Remote WebDriver mode PhantomJS is launching GhostDriver... 2015-05-05T12:10:09 [DEBUG] WebPage - setupFrame "" 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/modules/fs.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/modules/system.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/modules/webpage.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/modules/webserver.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./hub_register.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./logger.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./third_party/console++.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./config.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./third_party/parseuri.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "session.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "inputs.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/status_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./errors.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/shutdown_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/session_manager_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/session_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/webelement_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/router_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "webelementlocator.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" [INFO - 2015-05-05T19:10:09.096Z] GhostDriver - Main - running on port 59085 [!] BrowserCluster Worker#86888910: PhantomJS is ready. [*] BrowserCluster: Spawned #2 with PID 31708. [!] BrowserCluster Worker#86888910: Spawning PhantomJS... [!] BrowserCluster Worker#86888910: Attempt #0, chose port number 3750 [!] BrowserCluster Worker#86888910: Spawning process: /home/amar/work/tools/arachni-1.1-0.5.7/bin/../system/usr/bin/phantomjs [!] BrowserCluster Worker#86888910: Process spawned, waiting for it to boot-up... [!] BrowserCluster Worker#86888910: Boot-up complete. [!] BrowserCluster Worker#86888910: Fontconfig error: Cannot load default config file 2015-05-05T12:10:09 [DEBUG] CookieJar - Created but will not store cookies (use option '--cookies-file=' to enable persisten cookie storage) 2015-05-05T12:10:09 [DEBUG] Phantom - execute: Configuration 2015-05-05T12:10:09 [DEBUG] 0 objectName : "" 2015-05-05T12:10:09 [DEBUG] 1 cookiesFile : "" 2015-05-05T12:10:09 [DEBUG] 2 diskCacheEnabled : "true" 2015-05-05T12:10:09 [DEBUG] 3 maxDiskCacheSize : "-1" 2015-05-05T12:10:09 [DEBUG] 4 ignoreSslErrors : "true" 2015-05-05T12:10:09 [DEBUG] 5 localToRemoteUrlAccessEnabled : "false" 2015-05-05T12:10:09 [DEBUG] 6 outputEncoding : "UTF-8" 2015-05-05T12:10:09 [DEBUG] 7 proxyType : "http" 2015-05-05T12:10:09 [DEBUG] 8 proxy : "127.0.0.1:30981" 2015-05-05T12:10:09 [DEBUG] 9 proxyAuth : ":" 2015-05-05T12:10:09 [DEBUG] 10 scriptEncoding : "UTF-8" 2015-05-05T12:10:09 [DEBUG] 11 webSecurityEnabled : "true" 2015-05-05T12:10:09 [DEBUG] 12 offlineStoragePath : "" 2015-05-05T12:10:09 [DEBUG] 13 offlineStorageDefaultQuota : "-1" 2015-05-05T12:10:09 [DEBUG] 14 printDebugMessages : "true" 2015-05-05T12:10:09 [DEBUG] 15 javascriptCanOpenWindows : "true" 2015-05-05T12:10:09 [DEBUG] 16 javascriptCanCloseWindows : "true" 2015-05-05T12:10:09 [DEBUG] 17 sslProtocol : "sslv3" 2015-05-05T12:10:09 [DEBUG] 18 sslCertificatesPath : "" 2015-05-05T12:10:09 [DEBUG] 19 webdriver : ":3750" 2015-05-05T12:10:09 [DEBUG] 20 webdriverLogFile : "" 2015-05-05T12:10:09 [DEBUG] 21 webdriverLogLevel : "INFO" 2015-05-05T12:10:09 [DEBUG] 22 webdriverSeleniumGridHub : "" 2015-05-05T12:10:09 [DEBUG] Phantom - execute: Script & Arguments 2015-05-05T12:10:09 [DEBUG] script: "main.js" 2015-05-05T12:10:09 [DEBUG] 0 arg: "--ip=" 2015-05-05T12:10:09 [DEBUG] 1 arg: "--port=3750" 2015-05-05T12:10:09 [DEBUG] 2 arg: "--logLevel=INFO" 2015-05-05T12:10:09 [DEBUG] Phantom - execute: Starting Remote WebDriver mode PhantomJS is launching GhostDriver... 2015-05-05T12:10:09 [DEBUG] WebPage - setupFrame "" 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/modules/fs.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/modules/system.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/modules/webpage.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/modules/webserver.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./hub_register.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./logger.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./third_party/console++.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./config.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./third_party/parseuri.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "session.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "inputs.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/status_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./errors.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/shutdown_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/session_manager_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/session_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/webelement_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/router_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "webelementlocator.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" [INFO - 2015-05-05T19:10:09.343Z] GhostDriver - Main - running on port 3750 [!] BrowserCluster Worker#86888910: PhantomJS is ready. [*] BrowserCluster: Spawned #3 with PID 31726. [!] BrowserCluster Worker#86888910: Spawning PhantomJS... [!] BrowserCluster Worker#86888910: Attempt #0, chose port number 34472 [!] BrowserCluster Worker#86888910: Spawning process: /home/amar/work/tools/arachni-1.1-0.5.7/bin/../system/usr/bin/phantomjs [!] BrowserCluster Worker#86888910: Process spawned, waiting for it to boot-up... [!] BrowserCluster Worker#86888910: Boot-up complete. [!] BrowserCluster Worker#86888910: Fontconfig error: Cannot load default config file 2015-05-05T12:10:09 [DEBUG] CookieJar - Created but will not store cookies (use option '--cookies-file=' to enable persisten cookie storage) 2015-05-05T12:10:09 [DEBUG] Phantom - execute: Configuration 2015-05-05T12:10:09 [DEBUG] 0 objectName : "" 2015-05-05T12:10:09 [DEBUG] 1 cookiesFile : "" 2015-05-05T12:10:09 [DEBUG] 2 diskCacheEnabled : "true" 2015-05-05T12:10:09 [DEBUG] 3 maxDiskCacheSize : "-1" 2015-05-05T12:10:09 [DEBUG] 4 ignoreSslErrors : "true" 2015-05-05T12:10:09 [DEBUG] 5 localToRemoteUrlAccessEnabled : "false" 2015-05-05T12:10:09 [DEBUG] 6 outputEncoding : "UTF-8" 2015-05-05T12:10:09 [DEBUG] 7 proxyType : "http" 2015-05-05T12:10:09 [DEBUG] 8 proxy : "127.0.0.1:11752" 2015-05-05T12:10:09 [DEBUG] 9 proxyAuth : ":" 2015-05-05T12:10:09 [DEBUG] 10 scriptEncoding : "UTF-8" 2015-05-05T12:10:09 [DEBUG] 11 webSecurityEnabled : "true" 2015-05-05T12:10:09 [DEBUG] 12 offlineStoragePath : "" 2015-05-05T12:10:09 [DEBUG] 13 offlineStorageDefaultQuota : "-1" 2015-05-05T12:10:09 [DEBUG] 14 printDebugMessages : "true" 2015-05-05T12:10:09 [DEBUG] 15 javascriptCanOpenWindows : "true" 2015-05-05T12:10:09 [DEBUG] 16 javascriptCanCloseWindows : "true" 2015-05-05T12:10:09 [DEBUG] 17 sslProtocol : "sslv3" 2015-05-05T12:10:09 [DEBUG] 18 sslCertificatesPath : "" 2015-05-05T12:10:09 [DEBUG] 19 webdriver : ":34472" 2015-05-05T12:10:09 [DEBUG] 20 webdriverLogFile : "" 2015-05-05T12:10:09 [DEBUG] 21 webdriverLogLevel : "INFO" 2015-05-05T12:10:09 [DEBUG] 22 webdriverSeleniumGridHub : "" 2015-05-05T12:10:09 [DEBUG] Phantom - execute: Script & Arguments 2015-05-05T12:10:09 [DEBUG] script: "main.js" 2015-05-05T12:10:09 [DEBUG] 0 arg: "--ip=" 2015-05-05T12:10:09 [DEBUG] 1 arg: "--port=34472" 2015-05-05T12:10:09 [DEBUG] 2 arg: "--logLevel=INFO" 2015-05-05T12:10:09 [DEBUG] Phantom - execute: Starting Remote WebDriver mode PhantomJS is launching GhostDriver... 2015-05-05T12:10:09 [DEBUG] WebPage - setupFrame "" 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/modules/fs.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/modules/system.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/modules/webpage.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/modules/webserver.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./hub_register.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./logger.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./third_party/console++.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./config.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./third_party/parseuri.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "session.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "inputs.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/status_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./errors.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/shutdown_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/session_manager_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/session_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/webelement_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/router_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "webelementlocator.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" [INFO - 2015-05-05T19:10:09.592Z] GhostDriver - Main - running on port 34472 [!] BrowserCluster Worker#86888910: PhantomJS is ready. [*] BrowserCluster: Spawned #4 with PID 31744. [!] BrowserCluster Worker#86888910: Spawning PhantomJS... [!] BrowserCluster Worker#86888910: Attempt #0, chose port number 46132 [!] BrowserCluster Worker#86888910: Spawning process: /home/amar/work/tools/arachni-1.1-0.5.7/bin/../system/usr/bin/phantomjs [!] BrowserCluster Worker#86888910: Process spawned, waiting for it to boot-up... [!] BrowserCluster Worker#86888910: Boot-up complete. [!] BrowserCluster Worker#86888910: Fontconfig error: Cannot load default config file 2015-05-05T12:10:09 [DEBUG] CookieJar - Created but will not store cookies (use option '--cookies-file=' to enable persisten cookie storage) 2015-05-05T12:10:09 [DEBUG] Phantom - execute: Configuration 2015-05-05T12:10:09 [DEBUG] 0 objectName : "" 2015-05-05T12:10:09 [DEBUG] 1 cookiesFile : "" 2015-05-05T12:10:09 [DEBUG] 2 diskCacheEnabled : "true" 2015-05-05T12:10:09 [DEBUG] 3 maxDiskCacheSize : "-1" 2015-05-05T12:10:09 [DEBUG] 4 ignoreSslErrors : "true" 2015-05-05T12:10:09 [DEBUG] 5 localToRemoteUrlAccessEnabled : "false" 2015-05-05T12:10:09 [DEBUG] 6 outputEncoding : "UTF-8" 2015-05-05T12:10:09 [DEBUG] 7 proxyType : "http" 2015-05-05T12:10:09 [DEBUG] 8 proxy : "127.0.0.1:1149" 2015-05-05T12:10:09 [DEBUG] 9 proxyAuth : ":" 2015-05-05T12:10:09 [DEBUG] 10 scriptEncoding : "UTF-8" 2015-05-05T12:10:09 [DEBUG] 11 webSecurityEnabled : "true" 2015-05-05T12:10:09 [DEBUG] 12 offlineStoragePath : "" 2015-05-05T12:10:09 [DEBUG] 13 offlineStorageDefaultQuota : "-1" 2015-05-05T12:10:09 [DEBUG] 14 printDebugMessages : "true" 2015-05-05T12:10:09 [DEBUG] 15 javascriptCanOpenWindows : "true" 2015-05-05T12:10:09 [DEBUG] 16 javascriptCanCloseWindows : "true" 2015-05-05T12:10:09 [DEBUG] 17 sslProtocol : "sslv3" 2015-05-05T12:10:09 [DEBUG] 18 sslCertificatesPath : "" 2015-05-05T12:10:09 [DEBUG] 19 webdriver : ":46132" 2015-05-05T12:10:09 [DEBUG] 20 webdriverLogFile : "" 2015-05-05T12:10:09 [DEBUG] 21 webdriverLogLevel : "INFO" 2015-05-05T12:10:09 [DEBUG] 22 webdriverSeleniumGridHub : "" 2015-05-05T12:10:09 [DEBUG] Phantom - execute: Script & Arguments 2015-05-05T12:10:09 [DEBUG] script: "main.js" 2015-05-05T12:10:09 [DEBUG] 0 arg: "--ip=" 2015-05-05T12:10:09 [DEBUG] 1 arg: "--port=46132" 2015-05-05T12:10:09 [DEBUG] 2 arg: "--logLevel=INFO" 2015-05-05T12:10:09 [DEBUG] Phantom - execute: Starting Remote WebDriver mode PhantomJS is launching GhostDriver... 2015-05-05T12:10:09 [DEBUG] WebPage - setupFrame "" 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/modules/fs.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/modules/system.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/modules/webpage.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/modules/webserver.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./hub_register.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./logger.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./third_party/console++.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./config.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./third_party/parseuri.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "session.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "inputs.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/status_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] FileSystem - _open: ":/ghostdriver/./errors.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/shutdown_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/session_manager_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/session_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/webelement_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "request_handlers/router_request_handler.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: "webelementlocator.js" 2015-05-05T12:10:09 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" [INFO - 2015-05-05T19:10:09.837Z] GhostDriver - Main - running on port 46132 [!] BrowserCluster Worker#86888910: PhantomJS is ready. [*] BrowserCluster: Spawned #5 with PID 31762. [!] BrowserCluster Worker#86888910: Spawning PhantomJS... [!] BrowserCluster Worker#86888910: Attempt #0, chose port number 8959 [!] BrowserCluster Worker#86888910: Spawning process: /home/amar/work/tools/arachni-1.1-0.5.7/bin/../system/usr/bin/phantomjs [!] BrowserCluster Worker#86888910: Process spawned, waiting for it to boot-up... [!] BrowserCluster Worker#86888910: Boot-up complete. [!] BrowserCluster Worker#86888910: Fontconfig error: Cannot load default config file 2015-05-05T12:10:10 [DEBUG] CookieJar - Created but will not store cookies (use option '--cookies-file=' to enable persisten cookie storage) 2015-05-05T12:10:10 [DEBUG] Phantom - execute: Configuration 2015-05-05T12:10:10 [DEBUG] 0 objectName : "" 2015-05-05T12:10:10 [DEBUG] 1 cookiesFile : "" 2015-05-05T12:10:10 [DEBUG] 2 diskCacheEnabled : "true" 2015-05-05T12:10:10 [DEBUG] 3 maxDiskCacheSize : "-1" 2015-05-05T12:10:10 [DEBUG] 4 ignoreSslErrors : "true" 2015-05-05T12:10:10 [DEBUG] 5 localToRemoteUrlAccessEnabled : "false" 2015-05-05T12:10:10 [DEBUG] 6 outputEncoding : "UTF-8" 2015-05-05T12:10:10 [DEBUG] 7 proxyType : "http" 2015-05-05T12:10:10 [DEBUG] 8 proxy : "127.0.0.1:39713" 2015-05-05T12:10:10 [DEBUG] 9 proxyAuth : ":" 2015-05-05T12:10:10 [DEBUG] 10 scriptEncoding : "UTF-8" 2015-05-05T12:10:10 [DEBUG] 11 webSecurityEnabled : "true" 2015-05-05T12:10:10 [DEBUG] 12 offlineStoragePath : "" 2015-05-05T12:10:10 [DEBUG] 13 offlineStorageDefaultQuota : "-1" 2015-05-05T12:10:10 [DEBUG] 14 printDebugMessages : "true" 2015-05-05T12:10:10 [DEBUG] 15 javascriptCanOpenWindows : "true" 2015-05-05T12:10:10 [DEBUG] 16 javascriptCanCloseWindows : "true" 2015-05-05T12:10:10 [DEBUG] 17 sslProtocol : "sslv3" 2015-05-05T12:10:10 [DEBUG] 18 sslCertificatesPath : "" 2015-05-05T12:10:10 [DEBUG] 19 webdriver : ":8959" 2015-05-05T12:10:10 [DEBUG] 20 webdriverLogFile : "" 2015-05-05T12:10:10 [DEBUG] 21 webdriverLogLevel : "INFO" 2015-05-05T12:10:10 [DEBUG] 22 webdriverSeleniumGridHub : "" 2015-05-05T12:10:10 [DEBUG] Phantom - execute: Script & Arguments 2015-05-05T12:10:10 [DEBUG] script: "main.js" 2015-05-05T12:10:10 [DEBUG] 0 arg: "--ip=" 2015-05-05T12:10:10 [DEBUG] 1 arg: "--port=8959" 2015-05-05T12:10:10 [DEBUG] 2 arg: "--logLevel=INFO" 2015-05-05T12:10:10 [DEBUG] Phantom - execute: Starting Remote WebDriver mode PhantomJS is launching GhostDriver... 2015-05-05T12:10:10 [DEBUG] WebPage - setupFrame "" 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/modules/fs.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/modules/system.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/modules/webpage.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/modules/webserver.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/ghostdriver/./hub_register.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/ghostdriver/./logger.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/ghostdriver/./third_party/console++.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/ghostdriver/./config.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/ghostdriver/./third_party/parseuri.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "session.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "inputs.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "request_handlers/request_handler.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "request_handlers/status_request_handler.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/ghostdriver/./errors.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "request_handlers/shutdown_request_handler.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "request_handlers/session_manager_request_handler.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "request_handlers/session_request_handler.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "request_handlers/webelement_request_handler.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "request_handlers/router_request_handler.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "webelementlocator.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" [INFO - 2015-05-05T19:10:10.075Z] GhostDriver - Main - running on port 8959 [!] BrowserCluster Worker#86888910: PhantomJS is ready. [*] BrowserCluster: Spawned #6 with PID 31780. [*] BrowserCluster: Initialization completed with 6 browsers in the pool. [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 17 [!] Client: Performer: # [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 18 [!] Client: Performer: # [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 18 [!] Client: Performer: # [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 17 [!] Client: Performer: # [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 19 [!] Client: Performer: nil [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C"} [!] Client: Train?: false [!] Client: ------------ [*] [HTTP: 200] https://myserver/ [~] Identified as: apache, tomcat, jsp [~] Analysis resulted in 2 usable paths. [~] DOM depth: 0 (Limit: 5) [!] Browser: Spawning PhantomJS... [!] Browser: Attempt #0, chose port number 19734 [!] Browser: Spawning process: /home/amar/work/tools/arachni-1.1-0.5.7/bin/../system/usr/bin/phantomjs [!] Browser: Process spawned, waiting for it to boot-up... [!] Browser: Boot-up complete. [!] Browser: Fontconfig error: Cannot load default config file 2015-05-05T12:10:10 [DEBUG] CookieJar - Created but will not store cookies (use option '--cookies-file=' to enable persisten cookie storage) 2015-05-05T12:10:10 [DEBUG] Phantom - execute: Configuration 2015-05-05T12:10:10 [DEBUG] 0 objectName : "" 2015-05-05T12:10:10 [DEBUG] 1 cookiesFile : "" 2015-05-05T12:10:10 [DEBUG] 2 diskCacheEnabled : "true" 2015-05-05T12:10:10 [DEBUG] 3 maxDiskCacheSize : "-1" 2015-05-05T12:10:10 [DEBUG] 4 ignoreSslErrors : "true" 2015-05-05T12:10:10 [DEBUG] 5 localToRemoteUrlAccessEnabled : "false" 2015-05-05T12:10:10 [DEBUG] 6 outputEncoding : "UTF-8" 2015-05-05T12:10:10 [DEBUG] 7 proxyType : "http" 2015-05-05T12:10:10 [DEBUG] 8 proxy : "127.0.0.1:40630" 2015-05-05T12:10:10 [DEBUG] 9 proxyAuth : ":" 2015-05-05T12:10:10 [DEBUG] 10 scriptEncoding : "UTF-8" 2015-05-05T12:10:10 [DEBUG] 11 webSecurityEnabled : "true" 2015-05-05T12:10:10 [DEBUG] 12 offlineStoragePath : "" 2015-05-05T12:10:10 [DEBUG] 13 offlineStorageDefaultQuota : "-1" 2015-05-05T12:10:10 [DEBUG] 14 printDebugMessages : "true" 2015-05-05T12:10:10 [DEBUG] 15 javascriptCanOpenWindows : "true" 2015-05-05T12:10:10 [DEBUG] 16 javascriptCanCloseWindows : "true" 2015-05-05T12:10:10 [DEBUG] 17 sslProtocol : "sslv3" 2015-05-05T12:10:10 [DEBUG] 18 sslCertificatesPath : "" 2015-05-05T12:10:10 [DEBUG] 19 webdriver : ":19734" 2015-05-05T12:10:10 [DEBUG] 20 webdriverLogFile : "" 2015-05-05T12:10:10 [DEBUG] 21 webdriverLogLevel : "INFO" 2015-05-05T12:10:10 [DEBUG] 22 webdriverSeleniumGridHub : "" 2015-05-05T12:10:10 [DEBUG] Phantom - execute: Script & Arguments 2015-05-05T12:10:10 [DEBUG] script: "main.js" 2015-05-05T12:10:10 [DEBUG] 0 arg: "--ip=" 2015-05-05T12:10:10 [DEBUG] 1 arg: "--port=19734" 2015-05-05T12:10:10 [DEBUG] 2 arg: "--logLevel=INFO" 2015-05-05T12:10:10 [DEBUG] Phantom - execute: Starting Remote WebDriver mode PhantomJS is launching GhostDriver... 2015-05-05T12:10:10 [DEBUG] WebPage - setupFrame "" 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/modules/fs.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/modules/system.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/modules/webpage.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/modules/webserver.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/ghostdriver/./hub_register.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/ghostdriver/./logger.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/ghostdriver/./third_party/console++.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/ghostdriver/./config.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/ghostdriver/./third_party/parseuri.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "session.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "inputs.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "request_handlers/request_handler.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "request_handlers/status_request_handler.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:10 [DEBUG] FileSystem - _open: ":/ghostdriver/./errors.js" QMap(("mode", QVariant(QString, "r") ) ) 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "request_handlers/shutdown_request_handler.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "request_handlers/session_manager_request_handler.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "request_handlers/session_request_handler.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "request_handlers/webelement_request_handler.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "request_handlers/router_request_handler.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: "webelementlocator.js" 2015-05-05T12:10:10 [DEBUG] Phantom - injectJs: prepending ":/ghostdriver/" [INFO - 2015-05-05T19:10:10.550Z] GhostDriver - Main - running on port 19734 [!] Browser: PhantomJS is ready. [*] XSS in path: Checking for: https://myserver/ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 20 [!] Client: Performer: nil [!] Client: URL: https://myserver/%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [*] XSS in path: Checking for: https://myserver/>"'> [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 21 [!] Client: Performer: nil [!] Client: URL: https://myserver/%3E%22'%3E%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [*] XSS in path: Checking for: https://myserver/ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 22 [!] Client: Performer: nil [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {""=>""} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [*] XSS in path: Checking for: https://myserver/ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 23 [!] Client: Performer: nil [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {">\"'>"=>""} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [*] XSS in path: Checking for: https://myserver/ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 24 [!] Client: Performer: nil [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {""=>""} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [*] XSS in path: Checking for: https://myserver/ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 25 [!] Client: Performer: nil [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {""=>">\"'>"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 26 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 27 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 28 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 29 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 30 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 31 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 32 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 33 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 34 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 35 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 36 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 37 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 38 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 39 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 40 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 41 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 42 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 43 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 44 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 45 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 46 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 47 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 48 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="JSESSIONID" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 49 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 50 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="JSESSIONID" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 51 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="JSESSIONID" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 52 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>""} seed="" affected-input-name="JSESSIONID" affected-input-value=""> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "7C99150D9B7239E3B0C0B4255B61FE3Cscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 53 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3Cscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3Cscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3Cscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "7C99150D9B7239E3B0C0B4255B61FE3C;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 54 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3C;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "7C99150D9B7239E3B0C0B4255B61FE3Cscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 55 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3Cscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3Cscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3Cscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "7C99150D9B7239E3B0C0B4255B61FE3C\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 56 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3C\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "7C99150D9B7239E3B0C0B4255B61FE3Cscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 57 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3Cscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3Cscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3Cscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "7C99150D9B7239E3B0C0B4255B61FE3C';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 58 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3C';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/:cookie:["JSESSIONID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: JSESSIONID [!] XSS: |--> Inputs: [!] XSS: |----> "JSESSIONID" => "7C99150D9B7239E3B0C0B4255B61FE3C" [*] XSS: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 59 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C"} seed="" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3C"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/:cookie:["JSESSIONID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: JSESSIONID [!] XSS: |--> Inputs: [!] XSS: |----> "JSESSIONID" => "7C99150D9B7239E3B0C0B4255B61FE3C()\"&%1'-;'" [*] XSS: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 60 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C()\"&%1'-;'"} seed="()\"&%1'-;'" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3C()\"&%1'-;'"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C()\"&%1'-;'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/:cookie:["JSESSIONID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: JSESSIONID [!] XSS: |--> Inputs: [!] XSS: |----> "JSESSIONID" => "7C99150D9B7239E3B0C0B4255B61FE3C--> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: JSESSIONID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "JSESSIONID" => "7C99150D9B7239E3B0C0B4255B61FE3C arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" [*] XSS in HTML tag: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 62 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="} seed=" arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3C arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: JSESSIONID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "JSESSIONID" => "7C99150D9B7239E3B0C0B4255B61FE3C' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" [*] XSS in HTML tag: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 63 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"} seed="' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3C' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/:cookie:["JSESSIONID"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: JSESSIONID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "JSESSIONID" => "7C99150D9B7239E3B0C0B4255B61FE3C\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" [*] XSS in HTML tag: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 64 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""} seed="\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3C\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""> [!] Client: URL: https://myserver/ [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""} [!] Client: Train?: false [!] Client: ------------ [*] Harvesting HTTP responses... [~] Depending on server responsiveness and network conditions this may take a while. [!] Client: ------------ [!] Client: Got response for request ID#: 20 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 65 [!] Client: Performer: # [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C"} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 66 [!] Client: Performer: # [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C"} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 19 [!] Client: Performer: nil [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:09:53 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:09:53 GMT", "Connection"=>"close"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 22 [!] Client: Performer: nil [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/?%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E= [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 23 [!] Client: Performer: nil [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/?%3E%22%27%3E%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E= [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 24 [!] Client: Performer: nil [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/?=%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #26 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 26 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #27 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 27 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #39 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 39 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 25 [!] Client: Performer: nil [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/?=%3E%22%27%3E%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #28 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 28 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #29 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 29 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #30 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 30 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #31 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 31 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #32 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 32 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #33 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 33 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #34 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 34 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #35 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 35 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #37 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 37 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #36 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 36 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #38 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 38 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #41 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 41 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #42 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 42 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #43 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 43 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #44 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 44 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #45 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 45 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #46 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 46 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #47 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 47 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #48 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 48 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="JSESSIONID" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #49 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 49 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #50 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 50 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="JSESSIONID" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #51 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 51 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="JSESSIONID" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #52 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 52 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>""} seed="" affected-input-name="JSESSIONID" affected-input-value=""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #53 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 53 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3Cscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3Cscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #54 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 54 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3C;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #55 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 55 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3Cscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3Cscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #56 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 56 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3C\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #57 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 57 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3Cscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3Cscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #58 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 58 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3C';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS: Analyzing response #59 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 59 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C"} seed="" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3C"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS: Analyzing response #60 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 60 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C()\"&%1'-;'"} seed="()\"&%1'-;'" affected-input-name="JSESSIONID" affected-input-value="7C99150D9B7239E3B0C0B4255B61FE3C()\"&%1'-;'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Accept-Ranges: bytes ETag: W/"306-1427908672419" Last-Modified: Wed, 01 Apr 2015 17:17:52 GMT Content-Type: text/html Content-Length: 306 Date: Wed, 06 May 2015 18:09:53 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"306-1427908672419\"", "Last-Modified"=>"Wed, 01 Apr 2015 17:17:52 GMT", "Content-Type"=>"text/html", "Content-Length"=>"306", "Date"=>"Wed, 06 May 2015 18:09:53 GMT"} [!] Client: ------------ [*] XSS: Analyzing response #61 for cookie input 'JSESSIONID' pointing to: 'https://myserver/' [!] Client: ------------ [!] Client: Got response for request ID#: 61 [!] Client: Performer: #"7C99150D9B7239E3B0C0B4255B61FE3C"} inputs={"JSESSIONID"=>"7C99150D9B7239E3B0C0B4255B61FE3C--> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 92 [!] Client: Performer: #"default"} inputs={"menuID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="menuID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 93 [!] Client: Performer: #"default"} inputs={"menuID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="menuID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 94 [!] Client: Performer: #"default"} inputs={"menuID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="menuID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 95 [!] Client: Performer: #"default"} inputs={"menuID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="menuID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 96 [!] Client: Performer: #"default"} inputs={"menuID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="menuID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 97 [!] Client: Performer: #"default"} inputs={"menuID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="menuID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 98 [!] Client: Performer: #"default"} inputs={"menuID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="menuID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 99 [!] Client: Performer: #"default"} inputs={"menuID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="menuID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 100 [!] Client: Performer: #"default"} inputs={"menuID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="menuID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 101 [!] Client: Performer: #"default"} inputs={"menuID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="menuID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 102 [!] Client: Performer: #"default"} inputs={"menuID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="menuID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 103 [!] Client: Performer: #"default"} inputs={"menuID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="menuID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 104 [!] Client: Performer: #"default"} inputs={"menuID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="menuID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 105 [!] Client: Performer: #"default"} inputs={"menuID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="menuID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 106 [!] Client: Performer: #"default"} inputs={"menuID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="menuID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 107 [!] Client: Performer: #"default"} inputs={"menuID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="menuID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 108 [!] Client: Performer: #"default"} inputs={"menuID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="menuID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 109 [!] Client: Performer: #"default"} inputs={"menuID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="menuID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 110 [!] Client: Performer: #"default"} inputs={"menuID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="menuID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 111 [!] Client: Performer: #"default"} inputs={"menuID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="menuID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 112 [!] Client: Performer: #"default"} inputs={"menuID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="menuID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 113 [!] Client: Performer: #"default"} inputs={"menuID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="menuID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 114 [!] Client: Performer: #"default"} inputs={"menuID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="menuID" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 115 [!] Client: Performer: #"default"} inputs={"menuID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="menuID" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 116 [!] Client: Performer: #"default"} inputs={"menuID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="menuID" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 117 [!] Client: Performer: #"default"} inputs={"menuID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="menuID" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: menuID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "menuID" => "" [*] XSS in script context: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 118 [!] Client: Performer: #"default"} inputs={"menuID"=>""} seed="" affected-input-name="menuID" affected-input-value=""> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>""} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 119 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="username" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 120 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_password"=>"5543!%arachni_secret"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_username" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 121 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_password" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [*] XSS in script context: Submitting form with original values for username, j_username, j_password at 'https://myserver/Manager/j_security_check'. [!] XSS in script context: Submitting form with default or sample values, overriding trainer option. [!] XSS in script context: Trainer set to: ON [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 122 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"", "j_username"=>"", "j_password"=>""} seed=nil affected-input-name="__original_values__" affected-input-value=""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"", "j_username"=>"", "j_password"=>""} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: true [!] Client: ------------ [*] XSS in script context: Submitting form with sample values for username, j_username, j_password at 'https://myserver/Manager/j_security_check'. [!] XSS in script context: Submitting form with default or sample values, overriding trainer option. [!] XSS in script context: Trainer set to: ON [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 123 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed=nil affected-input-name="__sample_values__" affected-input-value=""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: true [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 124 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="username" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 125 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_password"=>"5543!%arachni_secret"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="j_username" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 126 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="j_password" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 127 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="username" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 128 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'", "j_password"=>"5543!%arachni_secret"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="j_username" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 129 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="j_password" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 130 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="username" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 131 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//", "j_password"=>"5543!%arachni_secret"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="j_username" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 132 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="j_password" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 133 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="username" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 134 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'", "j_password"=>"5543!%arachni_secret"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="j_username" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 135 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="j_password" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 136 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="username" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 137 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//", "j_password"=>"5543!%arachni_secret"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="j_username" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 138 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="j_password" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 139 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="username" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 140 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"", "j_password"=>"5543!%arachni_secret"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="j_username" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 141 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="j_password" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 142 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="username" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 143 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//", "j_password"=>"5543!%arachni_secret"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="j_username" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 144 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="j_password" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 145 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="username" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 146 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"", "j_password"=>"5543!%arachni_secret"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="j_username" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 147 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="j_password" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 148 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="username" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 149 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//", "j_password"=>"5543!%arachni_secret"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="j_username" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 150 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="j_password" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 151 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="username" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 152 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_password"=>"5543!%arachni_secret"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_username" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 153 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_password" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 154 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="username" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 155 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_password"=>"5543!%arachni_secret"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="j_username" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 156 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="j_password" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 157 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="username" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 158 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();", "j_password"=>"5543!%arachni_secret"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="j_username" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 159 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="j_password" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 160 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="username" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 161 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//", "j_password"=>"5543!%arachni_secret"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="j_username" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 162 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="j_password" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 163 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="username" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 164 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_password"=>"5543!%arachni_secret"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_username" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 165 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_password" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 166 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="username" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 167 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_password"=>"5543!%arachni_secret"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="j_username" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 168 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="j_password" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 169 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="username" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 170 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();", "j_password"=>"5543!%arachni_secret"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="j_username" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 171 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="j_password" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 172 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="username" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 173 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//", "j_password"=>"5543!%arachni_secret"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="j_username" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 174 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="j_password" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 175 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="username" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 176 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_password"=>"5543!%arachni_secret"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_username" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 177 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_password" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 178 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="username" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 179 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_password"=>"5543!%arachni_secret"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="j_username" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 180 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="j_password" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 181 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="username" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 182 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();", "j_password"=>"5543!%arachni_secret"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="j_username" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 183 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="j_password" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 184 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="username" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 185 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//", "j_password"=>"5543!%arachni_secret"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="j_username" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 186 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="j_password" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 187 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="username" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 188 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*", "j_password"=>"5543!%arachni_secret"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="j_username" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 189 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="j_password" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 190 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="username" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 191 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_password"=>"5543!%arachni_secret"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_username" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 192 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_password" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 193 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="username" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 194 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"", "j_password"=>"5543!%arachni_secret"} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="j_username" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 195 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="j_password" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 196 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="username" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 197 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'", "j_password"=>"5543!%arachni_secret"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="j_username" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 198 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="j_password" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 199 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="" affected-input-name="username" affected-input-value=""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_username [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "" [!] XSS in script context: |----> "j_password" => "5543!%arachni_secret" [*] XSS in script context: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 200 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"", "j_password"=>"5543!%arachni_secret"} seed="" affected-input-name="j_username" affected-input-value=""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: | [!] XSS in script context: |--> Auditing: j_password [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "username" => "arachni_name" [!] XSS in script context: |----> "j_username" => "arachni_name" [!] XSS in script context: |----> "j_password" => "" [*] XSS in script context: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 201 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>""} seed="" affected-input-name="j_password" affected-input-value=""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>""} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in script context: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 202 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 203 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 204 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 205 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 206 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 207 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 208 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 209 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 210 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 211 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 212 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 213 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 214 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 215 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 216 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 217 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 218 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 219 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 220 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 221 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 222 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 223 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 224 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="JSESSIONID" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 225 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 226 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="JSESSIONID" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 227 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="JSESSIONID" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 228 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>""} seed="" affected-input-name="JSESSIONID" affected-input-value=""> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: menuID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "menuID" => "defaultscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 229 [!] Client: Performer: #"default"} inputs={"menuID"=>"defaultscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="menuID" affected-input-value="defaultscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"defaultscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: menuID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "menuID" => "default;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 230 [!] Client: Performer: #"default"} inputs={"menuID"=>"default;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="menuID" affected-input-value="default;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"default;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: menuID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "menuID" => "defaultscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 231 [!] Client: Performer: #"default"} inputs={"menuID"=>"defaultscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="menuID" affected-input-value="defaultscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"defaultscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: menuID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "menuID" => "default\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 232 [!] Client: Performer: #"default"} inputs={"menuID"=>"default\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="menuID" affected-input-value="default\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"default\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: menuID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "menuID" => "defaultscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 233 [!] Client: Performer: #"default"} inputs={"menuID"=>"defaultscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="menuID" affected-input-value="defaultscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"defaultscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: menuID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "menuID" => "default';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 234 [!] Client: Performer: #"default"} inputs={"menuID"=>"default';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="menuID" affected-input-value="default';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"default';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: username [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "username" => "arachni_namescript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [!] XSS in HTML element event attribute: |----> "j_username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_password" => "5543!%arachni_secret" [*] XSS in HTML element event attribute: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 235 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_namescript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="username" affected-input-value="arachni_namescript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_namescript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: j_username [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_username" => "arachni_namescript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [!] XSS in HTML element event attribute: |----> "j_password" => "5543!%arachni_secret" [*] XSS in HTML element event attribute: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 236 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_namescript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_password"=>"5543!%arachni_secret"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_username" affected-input-value="arachni_namescript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_namescript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: j_password [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_password" => "5543!%arachni_secretscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 237 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secretscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_password" affected-input-value="5543!%arachni_secretscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secretscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in HTML element event attribute: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: username [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "username" => "arachni_name;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [!] XSS in HTML element event attribute: |----> "j_username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_password" => "5543!%arachni_secret" [*] XSS in HTML element event attribute: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 238 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="username" affected-input-value="arachni_name;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: j_username [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_username" => "arachni_name;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [!] XSS in HTML element event attribute: |----> "j_password" => "5543!%arachni_secret" [*] XSS in HTML element event attribute: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 239 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_password"=>"5543!%arachni_secret"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_username" affected-input-value="arachni_name;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: j_password [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_password" => "5543!%arachni_secret;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 240 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_password" affected-input-value="5543!%arachni_secret;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in HTML element event attribute: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: username [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "username" => "arachni_namescript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [!] XSS in HTML element event attribute: |----> "j_username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_password" => "5543!%arachni_secret" [*] XSS in HTML element event attribute: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 241 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_namescript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="username" affected-input-value="arachni_namescript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_namescript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: j_username [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_username" => "arachni_namescript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [!] XSS in HTML element event attribute: |----> "j_password" => "5543!%arachni_secret" [*] XSS in HTML element event attribute: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 242 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_namescript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_password"=>"5543!%arachni_secret"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_username" affected-input-value="arachni_namescript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_namescript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: j_password [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_password" => "5543!%arachni_secretscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 243 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secretscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_password" affected-input-value="5543!%arachni_secretscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secretscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in HTML element event attribute: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: username [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "username" => "arachni_name\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [!] XSS in HTML element event attribute: |----> "j_username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_password" => "5543!%arachni_secret" [*] XSS in HTML element event attribute: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 244 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="username" affected-input-value="arachni_name\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: j_username [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_username" => "arachni_name\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [!] XSS in HTML element event attribute: |----> "j_password" => "5543!%arachni_secret" [*] XSS in HTML element event attribute: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 245 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_password"=>"5543!%arachni_secret"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_username" affected-input-value="arachni_name\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: j_password [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_password" => "5543!%arachni_secret\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 246 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_password" affected-input-value="5543!%arachni_secret\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in HTML element event attribute: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: username [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "username" => "arachni_namescript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [!] XSS in HTML element event attribute: |----> "j_username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_password" => "5543!%arachni_secret" [*] XSS in HTML element event attribute: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 247 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_namescript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="username" affected-input-value="arachni_namescript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_namescript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: j_username [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_username" => "arachni_namescript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [!] XSS in HTML element event attribute: |----> "j_password" => "5543!%arachni_secret" [*] XSS in HTML element event attribute: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 248 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_namescript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_password"=>"5543!%arachni_secret"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_username" affected-input-value="arachni_namescript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_namescript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: j_password [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_password" => "5543!%arachni_secretscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 249 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secretscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_password" affected-input-value="5543!%arachni_secretscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secretscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in HTML element event attribute: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: username [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "username" => "arachni_name';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [!] XSS in HTML element event attribute: |----> "j_username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_password" => "5543!%arachni_secret" [*] XSS in HTML element event attribute: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 250 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="username" affected-input-value="arachni_name';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: j_username [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_username" => "arachni_name';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [!] XSS in HTML element event attribute: |----> "j_password" => "5543!%arachni_secret" [*] XSS in HTML element event attribute: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 251 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_password"=>"5543!%arachni_secret"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_username" affected-input-value="arachni_name';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: j_password [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_username" => "arachni_name" [!] XSS in HTML element event attribute: |----> "j_password" => "5543!%arachni_secret';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 252 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_password" affected-input-value="5543!%arachni_secret';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in HTML element event attribute: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8Bscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 253 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8Bscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8Bscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8Bscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8B;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 254 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8Bscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 255 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8Bscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8Bscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8Bscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8B\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 256 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8Bscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 257 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8Bscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8Bscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8Bscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8B';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 258 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: menuID [!] XSS: |--> Inputs: [!] XSS: |----> "menuID" => "default" [*] XSS: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 259 [!] Client: Performer: #"default"} inputs={"menuID"=>"default"} seed="" affected-input-name="menuID" affected-input-value="default"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"default"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: menuID [!] XSS: |--> Inputs: [!] XSS: |----> "menuID" => "default()\"&%1'-;'" [*] XSS: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 260 [!] Client: Performer: #"default"} inputs={"menuID"=>"default()\"&%1'-;'"} seed="()\"&%1'-;'" affected-input-name="menuID" affected-input-value="default()\"&%1'-;'"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"default()\"&%1'-;'"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: menuID [!] XSS: |--> Inputs: [!] XSS: |----> "menuID" => "default--> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: username [!] XSS: |--> Inputs: [!] XSS: |----> "username" => "arachni_name" [!] XSS: |----> "j_username" => "arachni_name" [!] XSS: |----> "j_password" => "5543!%arachni_secret" [*] XSS: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 262 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="" affected-input-name="username" affected-input-value="arachni_name"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: | [!] XSS: |--> Auditing: j_username [!] XSS: |--> Inputs: [!] XSS: |----> "username" => "arachni_name" [!] XSS: |----> "j_username" => "arachni_name" [!] XSS: |----> "j_password" => "5543!%arachni_secret" [*] XSS: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 263 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="" affected-input-name="j_username" affected-input-value="arachni_name"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: | [!] XSS: |--> Auditing: j_password [!] XSS: |--> Inputs: [!] XSS: |----> "username" => "arachni_name" [!] XSS: |----> "j_username" => "arachni_name" [!] XSS: |----> "j_password" => "5543!%arachni_secret" [*] XSS: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 264 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="" affected-input-name="j_password" affected-input-value="5543!%arachni_secret"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: username [!] XSS: |--> Inputs: [!] XSS: |----> "username" => "arachni_name()\"&%1'-;'" [!] XSS: |----> "j_username" => "arachni_name" [!] XSS: |----> "j_password" => "5543!%arachni_secret" [*] XSS: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 265 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name()\"&%1'-;'", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="()\"&%1'-;'" affected-input-name="username" affected-input-value="arachni_name()\"&%1'-;'"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name()\"&%1'-;'", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: | [!] XSS: |--> Auditing: j_username [!] XSS: |--> Inputs: [!] XSS: |----> "username" => "arachni_name" [!] XSS: |----> "j_username" => "arachni_name()\"&%1'-;'" [!] XSS: |----> "j_password" => "5543!%arachni_secret" [*] XSS: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 266 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name()\"&%1'-;'", "j_password"=>"5543!%arachni_secret"} seed="()\"&%1'-;'" affected-input-name="j_username" affected-input-value="arachni_name()\"&%1'-;'"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name()\"&%1'-;'", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: | [!] XSS: |--> Auditing: j_password [!] XSS: |--> Inputs: [!] XSS: |----> "username" => "arachni_name" [!] XSS: |----> "j_username" => "arachni_name" [!] XSS: |----> "j_password" => "5543!%arachni_secret()\"&%1'-;'" [*] XSS: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 267 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret()\"&%1'-;'"} seed="()\"&%1'-;'" affected-input-name="j_password" affected-input-value="5543!%arachni_secret()\"&%1'-;'"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret()\"&%1'-;'"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: username [!] XSS: |--> Inputs: [!] XSS: |----> "username" => "arachni_name--> "j_username" => "arachni_name" [!] XSS: |----> "j_password" => "5543!%arachni_secret" [*] XSS: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 268 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name--> Auditing: j_username [!] XSS: |--> Inputs: [!] XSS: |----> "username" => "arachni_name" [!] XSS: |----> "j_username" => "arachni_name--> "j_password" => "5543!%arachni_secret" [*] XSS: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 269 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name--> Auditing: j_password [!] XSS: |--> Inputs: [!] XSS: |----> "username" => "arachni_name" [!] XSS: |----> "j_username" => "arachni_name" [!] XSS: |----> "j_password" => "5543!%arachni_secret--> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: JSESSIONID [!] XSS: |--> Inputs: [!] XSS: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8B" [*] XSS: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 271 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} seed="" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: JSESSIONID [!] XSS: |--> Inputs: [!] XSS: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8B()\"&%1'-;'" [*] XSS: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 272 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B()\"&%1'-;'"} seed="()\"&%1'-;'" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B()\"&%1'-;'"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B()\"&%1'-;'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: JSESSIONID [!] XSS: |--> Inputs: [!] XSS: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8B--> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: menuID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "menuID" => "default arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" [*] XSS in HTML tag: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 274 [!] Client: Performer: #"default"} inputs={"menuID"=>"default arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="} seed=" arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" affected-input-name="menuID" affected-input-value="default arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"default arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: menuID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "menuID" => "default' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" [*] XSS in HTML tag: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 275 [!] Client: Performer: #"default"} inputs={"menuID"=>"default' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"} seed="' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" affected-input-name="menuID" affected-input-value="default' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"default' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/mypath/navigate:link:["menuID"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: menuID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "menuID" => "default\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" [*] XSS in HTML tag: Auditing link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 276 [!] Client: Performer: #"default"} inputs={"menuID"=>"default\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""} seed="\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" affected-input-name="menuID" affected-input-value="default\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""> [!] Client: URL: https://myserver/mypath/navigate [!] Client: Method: get [!] Client: Params: {"menuID"=>"default\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: username [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "username" => "arachni_name arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" [!] XSS in HTML tag: |----> "j_username" => "arachni_name" [!] XSS in HTML tag: |----> "j_password" => "5543!%arachni_secret" [*] XSS in HTML tag: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 277 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed=" arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" affected-input-name="username" affected-input-value="arachni_name arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: j_username [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "username" => "arachni_name" [!] XSS in HTML tag: |----> "j_username" => "arachni_name arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" [!] XSS in HTML tag: |----> "j_password" => "5543!%arachni_secret" [*] XSS in HTML tag: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 278 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=", "j_password"=>"5543!%arachni_secret"} seed=" arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" affected-input-name="j_username" affected-input-value="arachni_name arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: j_password [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "username" => "arachni_name" [!] XSS in HTML tag: |----> "j_username" => "arachni_name" [!] XSS in HTML tag: |----> "j_password" => "5543!%arachni_secret arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" [*] XSS in HTML tag: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 279 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="} seed=" arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" affected-input-name="j_password" affected-input-value="5543!%arachni_secret arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in HTML tag: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: username [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "username" => "arachni_name' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" [!] XSS in HTML tag: |----> "j_username" => "arachni_name" [!] XSS in HTML tag: |----> "j_password" => "5543!%arachni_secret" [*] XSS in HTML tag: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 280 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" affected-input-name="username" affected-input-value="arachni_name' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: j_username [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "username" => "arachni_name" [!] XSS in HTML tag: |----> "j_username" => "arachni_name' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" [!] XSS in HTML tag: |----> "j_password" => "5543!%arachni_secret" [*] XSS in HTML tag: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 281 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='", "j_password"=>"5543!%arachni_secret"} seed="' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" affected-input-name="j_username" affected-input-value="arachni_name' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: j_password [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "username" => "arachni_name" [!] XSS in HTML tag: |----> "j_username" => "arachni_name" [!] XSS in HTML tag: |----> "j_password" => "5543!%arachni_secret' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" [*] XSS in HTML tag: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: Queued request. [!] Client: ID#: 282 [!] Client: Performer: #> last-url="https://myserver/mypath/navigate?menuID=default" transitions=0> [!] Client: ID#: 282 [!] Client: URL: https://myserver/Manager/yui3/build/cssreset/reset-min.css [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"866-1427851526000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:26 GMT", "User-Agent"=>"Arachni/v1.1", "Accept"=>"text/css,*/*;q=0.1", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=95C73408E32EFF76D40D62F3A7F1FC8B", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 282 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"} seed="' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" affected-input-name="j_password" affected-input-value="5543!%arachni_secret' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in HTML tag: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/Manager/j_security_check:form:["j_password", "j_username", "username"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: username [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "username" => "arachni_name\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" [!] XSS in HTML tag: |----> "j_username" => "arachni_name" [!] XSS in HTML tag: |----> "j_password" => "5543!%arachni_secret" [*] XSS in HTML tag: Auditing form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 283 [!] Client: Train?: false [!] Client: ------------ [!] Client: Performer: #> last-url="https://myserver/mypath/navigate?menuID=default" transitions=0> [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" affected-input-name="username" affected-input-value="arachni_name\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: URL: https://myserver/Manager/yui3/build/cssgrids/grids-min.css [!] Client: Body: {"username"=>"arachni_name\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: j_username [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "username" => "arachni_name" [!] XSS in HTML tag: |----> "j_username" => "arachni_name\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" [!] XSS in HTML tag: |----> "j_password" => "5543!%arachni_secret" [*] XSS in HTML tag: Auditing form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"1465-1427851526000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:26 GMT", "User-Agent"=>"Arachni/v1.1", "Accept"=>"text/css,*/*;q=0.1", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=95C73408E32EFF76D40D62F3A7F1FC8B", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ID#: 285 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"", "j_password"=>"5543!%arachni_secret"} seed="\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" affected-input-name="j_username" affected-input-value="arachni_name\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"", "j_password"=>"5543!%arachni_secret"} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: j_password [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "username" => "arachni_name" [!] XSS in HTML tag: |----> "j_username" => "arachni_name" [!] XSS in HTML tag: |----> "j_password" => "5543!%arachni_secret\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" [*] XSS in HTML tag: Auditing form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 287 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""} seed="\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" affected-input-name="j_password" affected-input-value="5543!%arachni_secret\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: post [!] Client: Params: {} [!] Client: Body: {"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""} [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", ""], ["j_username", ""], ["username", ""]] [!] XSS in HTML tag: Self's #skip? method returned true for mutation, skipping: form:post:https://myserver/Manager/j_security_check:[["j_password", "5543!%arachni_secret"], ["j_username", "arachni_name"], ["username", "arachni_name"]] [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: JSESSIONID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8B arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" [*] XSS in HTML tag: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 288 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="} seed=" arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: JSESSIONID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8B' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" [*] XSS in HTML tag: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 289 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"} seed="' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/mypath/navigate?menuID=default:cookie:["JSESSIONID"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: JSESSIONID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8B\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" [*] XSS in HTML tag: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 290 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""} seed="\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""> [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""} [!] Client: Train?: false [!] Client: ------------ [*] Harvesting HTTP responses... [~] Depending on server responsiveness and network conditions this may take a while. [!] Client: ------------ [!] Client: Got response for request ID#: 86 [!] Client: Performer: nil [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate/%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=AB8A5AAF7B325F124C88556838CCC414; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=AB8A5AAF7B325F124C88556838CCC414; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 87 [!] Client: Performer: nil [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate/%3E%22'%3E%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=8E3D13FA05CE779549ACF9B22073008A; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=8E3D13FA05CE779549ACF9B22073008A; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 291 [!] Client: Performer: #> last-url="https://myserver/mypath/navigate?menuID=default" transitions=0> [!] Client: URL: https://myserver/Manager/content.css [!] Client: Method: get [!] Client: Params: {} [!] Client: Got response for request ID#: 88 [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"8425-1427851520000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:20 GMT", "User-Agent"=>"Arachni/v1.1", "Accept"=>"text/css,*/*;q=0.1", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=95C73408E32EFF76D40D62F3A7F1FC8B", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: Performer: nil [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate/?%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E= [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=87292EC7F7B5995B02A610FE860C3831; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=87292EC7F7B5995B02A610FE860C3831; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 282 [!] Client: Performer: #> last-url="https://myserver/mypath/navigate?menuID=default" transitions=0> [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/yui3/build/cssgrids/grids-min.css [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:10:14 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"1465-1427851526000" Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:10:14 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"1465-1427851526000\"", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 89 [!] Client: Performer: nil [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate/?%3E%22%27%3E%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E= [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=7F7162437D43A7CCF1687D593068AF29; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=7F7162437D43A7CCF1687D593068AF29; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 282 [!] Client: Performer: #> last-url="https://myserver/mypath/navigate?menuID=default" transitions=0> [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/yui3/build/cssreset/reset-min.css [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:10:14 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"866-1427851526000" Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:10:14 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"866-1427851526000\"", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 90 [!] Client: Performer: nil [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate/?=%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=287712CEDA07A5860B21EF2B42E0F647; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=287712CEDA07A5860B21EF2B42E0F647; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 91 [!] Client: Performer: nil [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate/?=%3E%22%27%3E%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=AF4E8A60E830972E8845DCAC87B8583E; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=AF4E8A60E830972E8845DCAC87B8583E; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #92 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 92 [!] Client: Performer: #"default"} inputs={"menuID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="menuID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink() [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=641956B4109CBBE216D838FC538746BE; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=641956B4109CBBE216D838FC538746BE; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #93 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 292 [!] Client: Performer: #> last-url="https://myserver/mypath/navigate?menuID=default" transitions=0> [!] Client: URL: https://myserver/Manager/containers.css [!] Client: Method: get [!] Client: Got response for request ID#: 93 [!] Client: Performer: #"default"} inputs={"menuID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="menuID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()// [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"6687-1427851520000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:20 GMT", "User-Agent"=>"Arachni/v1.1", "Accept"=>"text/css,*/*;q=0.1", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=95C73408E32EFF76D40D62F3A7F1FC8B", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=211556AFD38CCBE80B3B99602CCC41AA; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=211556AFD38CCBE80B3B99602CCC41AA; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #94 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 94 [!] Client: Performer: #"default"} inputs={"menuID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="menuID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=%27;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()%27 [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=97BA4E3F217E00BA3969D87703C8AF93; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=97BA4E3F217E00BA3969D87703C8AF93; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #95 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 95 [!] Client: Performer: #"default"} inputs={"menuID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="menuID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: ------------ [!] Client: URL: https://myserver/mypath/navigate?menuID=%27;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()%27// [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=5EF3ACC0F92C102BEA5783C0BEE2D80B; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=5EF3ACC0F92C102BEA5783C0BEE2D80B; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #96 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 96 [!] Client: Performer: #"default"} inputs={"menuID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="menuID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=%27;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();%27 [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=2E48362453D9E5CF82B0035033FC83BE; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=2E48362453D9E5CF82B0035033FC83BE; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #97 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 97 [!] Client: Performer: #"default"} inputs={"menuID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="menuID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=%27;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();%27// [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=F8279BA33FF0022EAE8363F53139832D; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=F8279BA33FF0022EAE8363F53139832D; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #98 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 291 [!] Client: Performer: #> last-url="https://myserver/mypath/navigate?menuID=default" transitions=0> [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/content.css [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:10:14 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"8425-1427851520000" Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:10:14 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"8425-1427851520000\"", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 98 [!] Client: Performer: #"default"} inputs={"menuID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="menuID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=%22;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()%22 [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=D95C0C38E111179F201D697082C02F4D; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=D95C0C38E111179F201D697082C02F4D; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #99 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 99 [!] Client: Performer: #"default"} inputs={"menuID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="menuID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: Queued request. [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=%22;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()%22// [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=134E32F641DDA3AD2B74B3ED5EA6F1BE; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=134E32F641DDA3AD2B74B3ED5EA6F1BE; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #100 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: ID#: 293 [!] Client: Performer: #> last-url="https://myserver/mypath/navigate?menuID=default" transitions=0> [!] Client: URL: https://myserver/Manager/layouts.css [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"2165-1427851520000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:20 GMT", "User-Agent"=>"Arachni/v1.1", "Accept"=>"text/css,*/*;q=0.1", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=95C73408E32EFF76D40D62F3A7F1FC8B", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: Got response for request ID#: 100 [!] Client: Performer: #"default"} inputs={"menuID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="menuID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=%22;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();%22 [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=457D5A87B20F7C3318164E8AA14706E9; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=457D5A87B20F7C3318164E8AA14706E9; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 294 [!] Client: Performer: # [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 295 [!] Client: Performer: # [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 67 [!] Client: Performer: nil [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #101 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 292 [!] Client: Performer: #> last-url="https://myserver/mypath/navigate?menuID=default" transitions=0> [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/containers.css [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:10:14 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"6687-1427851520000" Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:10:14 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"6687-1427851520000\"", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 296 [!] Client: Performer: #> last-url="https://myserver/mypath/navigate?menuID=default" transitions=0> [!] Client: URL: https://myserver/Manager/js/jquery/jquery-2.0.3.min.js [!] Client: Method: get [!] Client: ------------ [!] Client: Got response for request ID#: 101 [!] Client: Performer: #"default"} inputs={"menuID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="menuID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=%22;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();%22// [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=98950DA16710D5ACF0B459D58C1CDC85; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=98950DA16710D5ACF0B459D58C1CDC85; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #105 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 105 [!] Client: Performer: #"default"} inputs={"menuID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="menuID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();// [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=3E52EB814F3DCD8F11E36CD736F3F0E3; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=3E52EB814F3DCD8F11E36CD736F3F0E3; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #106 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 106 [!] Client: Performer: #"default"} inputs={"menuID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="menuID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink() [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=6512C2F19080808CAC3BCD2A10848456; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=6512C2F19080808CAC3BCD2A10848456; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #107 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 107 [!] Client: Params: {} [!] Client: Performer: #"default"} inputs={"menuID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="menuID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()// [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=334AE359229BBEC501A7037B2A8DB407; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=334AE359229BBEC501A7037B2A8DB407; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #108 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 108 [!] Client: Performer: #"default"} inputs={"menuID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="menuID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(); [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"83618-1427851522000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:22 GMT", "User-Agent"=>"Arachni/v1.1", "Accept"=>"*/*", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=95C73408E32EFF76D40D62F3A7F1FC8B", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=623ED3EB1250EEF17009B30599EA6BA0; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=623ED3EB1250EEF17009B30599EA6BA0; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #109 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 109 [!] Client: Performer: #"default"} inputs={"menuID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="menuID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();// [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=2287A4220926132240AB6BFAD182BAC2; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=2287A4220926132240AB6BFAD182BAC2; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #110 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 110 [!] Client: Performer: #"default"} inputs={"menuID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="menuID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=1;%0Awindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink() [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=99765B37436420E19F1F72184A5028EA; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=99765B37436420E19F1F72184A5028EA; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #111 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 111 [!] Client: Performer: #"default"} inputs={"menuID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="menuID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=1;%0Awindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()// [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=30840A6D93EAFDC54FE933B9DEFE50B7; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=30840A6D93EAFDC54FE933B9DEFE50B7; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #112 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 112 [!] Client: Performer: #"default"} inputs={"menuID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="menuID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=1;%0Awindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(); [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=6E9F020D82089B3E3708606CBEDE68CF; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=6E9F020D82089B3E3708606CBEDE68CF; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #113 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 113 [!] Client: Performer: #"default"} inputs={"menuID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="menuID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=1;%0Awindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();// [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=872C8B4DBC79B36994AF674E8DC25A6C; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=872C8B4DBC79B36994AF674E8DC25A6C; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #114 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 114 [!] Client: Performer: #"default"} inputs={"menuID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="menuID" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=*/;%0Awindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/* [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=4B2F966AE35C96006BCD0D72F47A3713; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=4B2F966AE35C96006BCD0D72F47A3713; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #115 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 115 [!] Client: Performer: #"default"} inputs={"menuID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="menuID" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink() [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=AD0BB89F02C3510424449F331061B94D; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=AD0BB89F02C3510424449F331061B94D; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #116 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 116 [!] Client: Performer: #"default"} inputs={"menuID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="menuID" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=%22,x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:%22 [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=E5185A13BB685C617916D19A9B1DC3A2; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=E5185A13BB685C617916D19A9B1DC3A2; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #117 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 117 [!] Client: Performer: #"default"} inputs={"menuID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="menuID" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=%27,x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:%27 [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=42ABA607EE43EB58291E6CECF967AA65; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=42ABA607EE43EB58291E6CECF967AA65; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #118 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 118 [!] Client: Performer: #"default"} inputs={"menuID"=>""} seed="" affected-input-name="menuID" affected-input-value=""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=%3C/script%3E%3Cscript%3Ewindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()%3C/script%3E [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=2E8C8CFD72503C55B1C31843B43B179B; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=2E8C8CFD72503C55B1C31843B43B179B; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #119 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 119 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="username" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:13 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:13 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #102 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 102 [!] Client: Performer: #"default"} inputs={"menuID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="menuID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink() [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=373DC5DDB478368108F9A43C0F85395D; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=373DC5DDB478368108F9A43C0F85395D; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #103 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 296 [!] Client: Performer: #> last-url="https://myserver/mypath/navigate?menuID=default" transitions=0> [!] Client: Queued request. [!] Client: ID#: 297 [!] Client: Performer: #> last-url="https://myserver/mypath/navigate?menuID=default" transitions=0> [!] Client: URL: https://myserver/Manager/pagecss/Logon.jsp.css [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"859-1427851520000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:20 GMT", "User-Agent"=>"Arachni/v1.1", "Accept"=>"text/css,*/*;q=0.1", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=95C73408E32EFF76D40D62F3A7F1FC8B", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/js/jquery/jquery-2.0.3.min.js [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:10:15 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"83618-1427851522000" Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:10:15 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"83618-1427851522000\"", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 103 [!] Client: Performer: #"default"} inputs={"menuID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="menuID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()// [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=79527F61A05D78BFB0AD1FD3F5D3681A; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=79527F61A05D78BFB0AD1FD3F5D3681A; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 293 [!] Client: Performer: #> last-url="https://myserver/mypath/navigate?menuID=default" transitions=0> [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/layouts.css [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:10:15 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"2165-1427851520000" Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:10:15 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"2165-1427851520000\"", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #104 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 104 [!] Client: Performer: #"default"} inputs={"menuID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="menuID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(); [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=60606131CCAA1EFB1FBF1225DECECCA2; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=60606131CCAA1EFB1FBF1225DECECCA2; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #120 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 120 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_password"=>"5543!%arachni_secret"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_username" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #121 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 121 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_password" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #122 for form input '__original_values__' pointing to: 'https://myserver/Manager/j_security_check' [!] Trainer: Started for response with request ID: #122 [~] Trainer: Found 1 new cookies. [!] Trainer: Training complete. [!] Client: ------------ [!] Client: Got response for request ID#: 122 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"", "j_username"=>"", "j_password"=>""} seed=nil affected-input-name="__original_values__" affected-input-value=""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #123 for form input '__sample_values__' pointing to: 'https://myserver/Manager/j_security_check' [!] Trainer: Started for response with request ID: #123 [~] Trainer: Found 1 new links. [!] Trainer: Training complete. [!] Client: ------------ [!] Client: Got response for request ID#: 123 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed=nil affected-input-name="__sample_values__" affected-input-value=""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #124 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 124 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="username" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #125 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 125 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_password"=>"5543!%arachni_secret"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="j_username" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #126 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 126 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="j_password" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #127 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 127 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="username" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #128 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 128 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'", "j_password"=>"5543!%arachni_secret"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="j_username" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #129 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 129 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="j_password" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #130 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 130 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="username" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #131 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 131 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//", "j_password"=>"5543!%arachni_secret"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="j_username" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #132 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 132 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="j_password" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #133 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 133 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="username" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #134 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 134 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'", "j_password"=>"5543!%arachni_secret"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="j_username" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #135 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 135 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="j_password" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #136 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 298 [!] Client: Performer: #> last-url="https://myserver/mypath/navigate?menuID=default" transitions=0> [!] Client: URL: https://myserver/Manager/js/logon.js [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"If-None-Match"=>"W/\"1381-1427851524000\"", "If-Modified-Since"=>"Wed, 01 Apr 2015 01:25:24 GMT", "User-Agent"=>"Arachni/v1.1", "Accept"=>"*/*", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=95C73408E32EFF76D40D62F3A7F1FC8B", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 297 [!] Client: Performer: #> last-url="https://myserver/mypath/navigate?menuID=default" transitions=0> [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/pagecss/Logon.jsp.css [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:10:15 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"859-1427851520000" Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:10:15 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"859-1427851520000\"", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 136 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="username" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #137 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 137 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//", "j_password"=>"5543!%arachni_secret"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="j_username" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #138 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 138 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="j_password" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #139 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 139 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="username" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #152 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 152 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_password"=>"5543!%arachni_secret"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_username" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #140 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 140 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"", "j_password"=>"5543!%arachni_secret"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="j_username" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #141 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 141 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="j_password" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #142 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 142 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="username" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #143 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 143 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//", "j_password"=>"5543!%arachni_secret"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="j_username" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #144 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 144 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="j_password" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #145 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 145 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="username" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #146 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 146 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"", "j_password"=>"5543!%arachni_secret"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="j_username" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #147 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 147 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="j_password" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #148 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 148 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="username" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #149 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 149 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//", "j_password"=>"5543!%arachni_secret"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="j_username" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #150 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 150 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="j_password" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #151 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 151 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="username" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #153 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 298 [!] Client: Performer: #> last-url="https://myserver/mypath/navigate?menuID=default" transitions=0> [!] Client: Status: 304 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/js/logon.js [!] Client: Headers: HTTP/1.1 304 Not Modified Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Wed, 06 May 2015 19:10:15 GMT Pragma: cache Cache-Control: max-age=3600, must-revalidate ETag: W/"1381-1427851524000" Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Wed, 06 May 2015 19:10:15 GMT", "Pragma"=>"cache", "Cache-Control"=>"max-age=3600, must-revalidate", "Etag"=>"W/\"1381-1427851524000\"", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 153 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_password" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #154 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 154 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="username" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 299 [!] Client: Performer: #> last-url="https://myserver/mypath/navigate?menuID=default" transitions=0> [!] Client: URL: https://myserver/Manager/servlet/l10n/css/overrides.css [!] Client: Method: get [!] Client: Params: {} [*] XSS in script context: Analyzing response #155 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 155 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_password"=>"5543!%arachni_secret"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="j_username" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #156 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 156 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="j_password" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Body: [!] Client: Headers: {"User-Agent"=>"Arachni/v1.1", "Accept"=>"text/css,*/*;q=0.1", "Referer"=>"https://myserver/mypath/navigate?menuID=default", "Cookie"=>"JSESSIONID=95C73408E32EFF76D40D62F3A7F1FC8B", "Accept-Encoding"=>"gzip", "Accept-Language"=>"en,*", "Host"=>"myserver"} [!] Client: Cookies: {} [!] Client: Train?: false [!] Client: ------------ [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #157 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 157 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="username" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #158 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 158 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();", "j_password"=>"5543!%arachni_secret"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="j_username" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #159 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 159 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="j_password" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #160 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 160 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="username" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #167 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 167 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_password"=>"5543!%arachni_secret"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="j_username" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #161 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 161 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//", "j_password"=>"5543!%arachni_secret"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="j_username" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #162 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 162 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="j_password" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #163 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 163 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="username" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #164 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 164 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_password"=>"5543!%arachni_secret"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_username" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #165 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 165 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_password" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #166 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 166 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="username" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #168 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 168 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="j_password" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #169 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 169 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="username" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #170 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 170 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();", "j_password"=>"5543!%arachni_secret"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="j_username" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #171 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 171 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="j_password" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #172 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 172 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="username" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #173 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 173 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//", "j_password"=>"5543!%arachni_secret"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="j_username" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #174 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 174 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="j_password" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #175 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 175 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="username" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #176 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 176 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_password"=>"5543!%arachni_secret"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_username" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #177 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 177 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_password" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #178 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 178 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="username" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #179 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 179 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//", "j_password"=>"5543!%arachni_secret"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="j_username" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #180 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 180 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="j_password" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #181 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 181 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="username" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:14 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:14 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #182 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 182 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();", "j_password"=>"5543!%arachni_secret"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="j_username" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #183 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 183 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="j_password" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #184 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 184 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="username" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #185 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 185 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//", "j_password"=>"5543!%arachni_secret"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="j_username" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #186 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 186 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="j_password" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #187 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 187 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="username" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #188 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 188 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*", "j_password"=>"5543!%arachni_secret"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="j_username" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #189 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 189 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="j_password" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #190 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 190 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="username" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #191 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 299 [!] Client: Performer: #> last-url="https://myserver/mypath/navigate?menuID=default" transitions=0> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/servlet/l10n/css/overrides.css [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Expires: Thu, 01 Jan 1970 00:00:00 GMT Pragma: no-cache Cache-Control: no-cache Content-Type: text/css Content-Length: 240 Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Pragma"=>"no-cache", "Cache-Control"=>"no-cache", "Content-Type"=>"text/css", "Content-Length"=>"240", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 191 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()", "j_password"=>"5543!%arachni_secret"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_username" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #192 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 192 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="j_password" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #193 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 193 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="username" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #194 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 194 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"", "j_password"=>"5543!%arachni_secret"} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="j_username" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #195 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 195 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="j_password" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #196 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 196 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="username" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #197 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 197 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'", "j_password"=>"5543!%arachni_secret"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="j_username" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #198 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 198 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="j_password" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #199 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 199 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="" affected-input-name="username" affected-input-value=""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #200 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 200 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"", "j_password"=>"5543!%arachni_secret"} seed="" affected-input-name="j_username" affected-input-value=""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #201 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 201 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>""} seed="" affected-input-name="j_password" affected-input-value=""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #203 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 203 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=A7199B9B77185B551E223C4298A54DBD; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=A7199B9B77185B551E223C4298A54DBD; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #204 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 204 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=37890CA03FC127608228F75896952321; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=37890CA03FC127608228F75896952321; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #205 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 205 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=5D6876CC6DAEDD1AD13D42A0585D99BF; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=5D6876CC6DAEDD1AD13D42A0585D99BF; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #206 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 206 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=3302A01B5FE0A8F1AECC89BB7897CE08; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=3302A01B5FE0A8F1AECC89BB7897CE08; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #207 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 207 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=AC0F2A57EE6068E9DAAD94508C6FA2D2; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=AC0F2A57EE6068E9DAAD94508C6FA2D2; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #208 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 208 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=E04E226CC2576717513816B33777A2FC; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=E04E226CC2576717513816B33777A2FC; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #210 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 210 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=C1CA0609DDF61E436042713A012A1389; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=C1CA0609DDF61E436042713A012A1389; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #212 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 212 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=6FB9034A29FA43BED1BE3BD714F0515E; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=6FB9034A29FA43BED1BE3BD714F0515E; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #213 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 213 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=495A434FC41DDDBA583921CD1B15894B; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=495A434FC41DDDBA583921CD1B15894B; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #214 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 214 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=AAA8EE65013190981D2D024BD7D50E58; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=AAA8EE65013190981D2D024BD7D50E58; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #215 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 215 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=2A41AF04339A53A5ED5C3AD59635ED04; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=2A41AF04339A53A5ED5C3AD59635ED04; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #216 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 216 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=5AB1EBC3ACBB36200A15E3043BD1177D; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=5AB1EBC3ACBB36200A15E3043BD1177D; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #202 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 202 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=95F89694EE80BCAF4B207511FC774373; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=95F89694EE80BCAF4B207511FC774373; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #209 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 209 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=4995CEC22F1338C789FD910C37943153; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=4995CEC22F1338C789FD910C37943153; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #211 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 211 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=F16D901EEF0295175BE957BE4C0784F2; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=F16D901EEF0295175BE957BE4C0784F2; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #217 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 217 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=176F0299585FA8BFC09F317A24211EF7; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=176F0299585FA8BFC09F317A24211EF7; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #218 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 218 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=1572524CBAD15FEBFEFAF8169769CABA; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=1572524CBAD15FEBFEFAF8169769CABA; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #219 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 219 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=F4CE4552330F99E93DD1760382CB7C27; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=F4CE4552330F99E93DD1760382CB7C27; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #220 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 220 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=E4F4B3F05AC764C2D3404A298DEFAB69; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=E4F4B3F05AC764C2D3404A298DEFAB69; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #221 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 221 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=5B23DF4514B41315E3516F3EB1682FC0; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=5B23DF4514B41315E3516F3EB1682FC0; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #222 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 222 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=4F0F22E1B53CE8D88A4ADC0AE612D08D; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=4F0F22E1B53CE8D88A4ADC0AE612D08D; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #223 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 223 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=A1F47983B5E188766E2F5CB4A8A13E70; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=A1F47983B5E188766E2F5CB4A8A13E70; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #224 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 224 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="JSESSIONID" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=C7D962A6897B56E508A60AE3840CE418; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=C7D962A6897B56E508A60AE3840CE418; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #225 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 225 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=98058C9FB54BBFF9D341B2579DE849D0; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=98058C9FB54BBFF9D341B2579DE849D0; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #226 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 226 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="JSESSIONID" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=C044825658373D300D9E0153CBDAB138; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=C044825658373D300D9E0153CBDAB138; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #227 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 227 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="JSESSIONID" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=1E9FB78E0EB197964CF30629ACE80355; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=1E9FB78E0EB197964CF30629ACE80355; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #228 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 228 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>""} seed="" affected-input-name="JSESSIONID" affected-input-value=""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=3F8AE5743ACD6BAFB568DC69B53FDC2E; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=3F8AE5743ACD6BAFB568DC69B53FDC2E; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #229 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 229 [!] Client: Performer: #"default"} inputs={"menuID"=>"defaultscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="menuID" affected-input-value="defaultscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=defaultscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5// [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=3C60F2AF7837D1F2C091EF9744DA37E0; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=3C60F2AF7837D1F2C091EF9744DA37E0; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #230 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 230 [!] Client: Performer: #"default"} inputs={"menuID"=>"default;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="menuID" affected-input-value="default;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5// [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=601730AB38BC755A682EB24BEEE0A846; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=601730AB38BC755A682EB24BEEE0A846; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #231 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 231 [!] Client: Performer: #"default"} inputs={"menuID"=>"defaultscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="menuID" affected-input-value="defaultscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=defaultscript:%22;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5// [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=8C8C1BC1691295A3241CF38867B10EFF; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=8C8C1BC1691295A3241CF38867B10EFF; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #232 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 232 [!] Client: Performer: #"default"} inputs={"menuID"=>"default\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="menuID" affected-input-value="default\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default%22;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5// [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=831943A001C8AC044EC2D5F0B23AC73A; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=831943A001C8AC044EC2D5F0B23AC73A; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #233 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 233 [!] Client: Performer: #"default"} inputs={"menuID"=>"defaultscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="menuID" affected-input-value="defaultscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=defaultscript:%27;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5// [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=E5933F14B170592883B893EDBDF69543; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=E5933F14B170592883B893EDBDF69543; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #234 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [!] Client: ------------ [!] Client: Got response for request ID#: 234 [!] Client: Performer: #"default"} inputs={"menuID"=>"default';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="menuID" affected-input-value="default';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default%27;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5// [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=17F1D1B35CF37E9C1330A55B6648170F; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=17F1D1B35CF37E9C1330A55B6648170F; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #235 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 235 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_namescript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="username" affected-input-value="arachni_namescript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #236 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 236 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_namescript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_password"=>"5543!%arachni_secret"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_username" affected-input-value="arachni_namescript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #237 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 237 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secretscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_password" affected-input-value="5543!%arachni_secretscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #238 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 238 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="username" affected-input-value="arachni_name;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #239 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 239 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_password"=>"5543!%arachni_secret"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_username" affected-input-value="arachni_name;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #240 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 240 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_password" affected-input-value="5543!%arachni_secret;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #241 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 241 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_namescript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="username" affected-input-value="arachni_namescript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #253 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 253 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8Bscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8Bscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=8C2C02BBCA5372A01085994E0E24C773; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=8C2C02BBCA5372A01085994E0E24C773; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #242 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 242 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_namescript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_password"=>"5543!%arachni_secret"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_username" affected-input-value="arachni_namescript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #243 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 243 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secretscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_password" affected-input-value="5543!%arachni_secretscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #244 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 244 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="username" affected-input-value="arachni_name\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #245 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 245 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_password"=>"5543!%arachni_secret"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_username" affected-input-value="arachni_name\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #246 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 246 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_password" affected-input-value="5543!%arachni_secret\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #247 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 247 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_namescript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="username" affected-input-value="arachni_namescript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #248 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 248 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_namescript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_password"=>"5543!%arachni_secret"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_username" affected-input-value="arachni_namescript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #249 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 249 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secretscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_password" affected-input-value="5543!%arachni_secretscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #250 for form input 'username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 250 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="username" affected-input-value="arachni_name';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #251 for form input 'j_username' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 251 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//", "j_password"=>"5543!%arachni_secret"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_username" affected-input-value="arachni_name';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #252 for form input 'j_password' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 252 [!] Client: Performer: #"", "j_username"=>"", "j_password"=>""} inputs={"username"=>"arachni_name", "j_username"=>"arachni_name", "j_password"=>"5543!%arachni_secret';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="j_password" affected-input-value="5543!%arachni_secret';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #254 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 254 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=139A3C5ACDEB1C7310B747BBE26F54FB; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=139A3C5ACDEB1C7310B747BBE26F54FB; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #255 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 255 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8Bscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8Bscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=1BE2BC689E211E45D88C70F99F1A8EED; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=1BE2BC689E211E45D88C70F99F1A8EED; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #256 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 256 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=16169D49CEBF1DC76F3D3D2C21DACD58; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=16169D49CEBF1DC76F3D3D2C21DACD58; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #257 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 257 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8Bscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8Bscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=8ED91FE73B6D0B6E77602497130D1194; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=8ED91FE73B6D0B6E77602497130D1194; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #258 for cookie input 'JSESSIONID' pointing to: 'https://myserver/mypath/navigate?menuID=default' [!] Client: ------------ [!] Client: Got response for request ID#: 258 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=C1D7EF5F310A84FD2ED77C552E5F1D04; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=C1D7EF5F310A84FD2ED77C552E5F1D04; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS: Analyzing response #259 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [~] XSS: Progressing to deferred browser evaluation of response. [!] BrowserCluster: Queueing: # Symantec Data Loss Prevention
@taint="" @injector=nil> [!] Client: ------------ [!] Client: Got response for request ID#: 259 [!] BrowserCluster Worker#86888910: Started: # Symantec Data Loss Prevention
@taint="" @injector=nil> [!] Client: Performer: #"default"} inputs={"menuID"=>"default"} seed="" affected-input-name="menuID" affected-input-value="default"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default%3Csome_dangerous_input_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=80FF0FAC13EF5377BE2E073BEC6729E0; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=80FF0FAC13EF5377BE2E073BEC6729E0; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS: Analyzing response #260 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [~] XSS: Progressing to deferred browser evaluation of response. [!] BrowserCluster: Queueing: # Symantec Data Loss Prevention
@taint="" @injector=nil> [!] Client: ------------ [!] Client: Got response for request ID#: 260 [!] Client: Performer: #"default"} inputs={"menuID"=>"default()\"&%1'-;'"} seed="()\"&%1'-;'" affected-input-name="menuID" affected-input-value="default()\"&%1'-;'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/mypath/navigate?menuID=default()%22%26%251%27-;%3Csome_dangerous_input_6084f136be21a63768e6b49e041de7e5/%3E%27 [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: JSESSIONID=769CC5B911F525609224D64346AD27EE; Path=/Manager/; Secure; HttpOnly Pragma: No-cache X-Frame-Options: SAMEORIGIN Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:16 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Set-Cookie"=>"JSESSIONID=769CC5B911F525609224D64346AD27EE; Path=/Manager/; Secure; HttpOnly", "Pragma"=>"No-cache", "X-Frame-Options"=>"SAMEORIGIN", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:16 GMT"} [!] Client: ------------ [*] XSS: Analyzing response #261 for link input 'menuID' pointing to: 'https://myserver/mypath/navigate' [~] XSS: Progressing to deferred browser evaluation of response. [!] BrowserCluster: Queueing: # Symantec Data Loss Prevention
@taint="" @injector=nil> [!] Client: ------------ [!] Client: Got response for request ID#: 261 [!] BrowserCluster Worker#86888910: Started: # Symantec Data Loss Prevention
@taint="" @injector=nil> [!] Client: Performer: #"default"} inputs={"menuID"=>"default--> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 361 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 362 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 363 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 364 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 365 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 366 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 367 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 368 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 369 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 370 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 371 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 372 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 373 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 374 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 375 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 376 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 377 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 378 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 379 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 380 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 381 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 382 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 383 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="JSESSIONID" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 384 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 385 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="JSESSIONID" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 386 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="JSESSIONID" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 387 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>""} seed="" affected-input-name="JSESSIONID" affected-input-value=""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8Bscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 388 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8Bscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8Bscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8Bscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8B;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 389 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8Bscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 390 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8Bscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8Bscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8Bscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8B\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 391 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8Bscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 392 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8Bscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8Bscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8Bscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8B';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 393 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: JSESSIONID [!] XSS: |--> Inputs: [!] XSS: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8B" [*] XSS: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 394 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} seed="" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: JSESSIONID [!] XSS: |--> Inputs: [!] XSS: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8B()\"&%1'-;'" [*] XSS: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 395 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B()\"&%1'-;'"} seed="()\"&%1'-;'" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B()\"&%1'-;'"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B()\"&%1'-;'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: JSESSIONID [!] XSS: |--> Inputs: [!] XSS: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8B--> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: JSESSIONID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8B arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" [*] XSS in HTML tag: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 397 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="} seed=" arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: JSESSIONID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8B' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" [*] XSS in HTML tag: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 398 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"} seed="' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/Manager/j_security_check:cookie:["JSESSIONID"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: JSESSIONID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "JSESSIONID" => "95C73408E32EFF76D40D62F3A7F1FC8B\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" [*] XSS in HTML tag: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 399 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""} seed="\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""> [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""} [!] Client: Train?: false [!] Client: ------------ [*] Harvesting HTTP responses... [~] Depending on server responsiveness and network conditions this may take a while. [!] Client: ------------ [!] Client: Got response for request ID#: 356 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check/%3E%22'%3E%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:38 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:38 GMT"} [!] Client: ------------ [~] AutoThrottle: Increasing HTTP request concurrency to 3 (+1). [~] AutoThrottle: Average response time for this burst: 0.006668 [!] Client: ------------ [!] Client: Got response for request ID#: 355 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check/%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:38 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:38 GMT"} [!] Client: ------------ [~] AutoThrottle: Increasing HTTP request concurrency to 4 (+1). [~] AutoThrottle: Average response time for this burst: 0.007937666666666668 [!] Client: ------------ [!] Client: Got response for request ID#: 357 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check/?%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E= [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:38 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:38 GMT"} [!] Client: ------------ [~] AutoThrottle: Increasing HTTP request concurrency to 5 (+1). [~] AutoThrottle: Average response time for this burst: 0.0091115 [!] Client: ------------ [!] Client: Got response for request ID#: 358 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check/?%3E%22%27%3E%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E= [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:38 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:38 GMT"} [!] Client: ------------ [~] AutoThrottle: Increasing HTTP request concurrency to 6 (+1). [~] AutoThrottle: Average response time for this burst: 0.0099054 [!] Client: ------------ [!] Client: Got response for request ID#: 359 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check/?=%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:38 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:38 GMT"} [!] Client: ------------ [~] AutoThrottle: Increasing HTTP request concurrency to 7 (+1). [~] AutoThrottle: Average response time for this burst: 0.04931233333333334 [!] Client: ------------ [!] Client: Got response for request ID#: 360 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check/?=%3E%22%27%3E%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:38 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:38 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #361 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [~] AutoThrottle: Increasing HTTP request concurrency to 8 (+1). [~] AutoThrottle: Average response time for this burst: 0.07848542857142858 [!] Client: ------------ [!] Client: Got response for request ID#: 361 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:38 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:38 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #362 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [~] AutoThrottle: Increasing HTTP request concurrency to 9 (+1). [~] AutoThrottle: Average response time for this burst: 0.07008550000000001 [!] Client: ------------ [!] Client: Got response for request ID#: 362 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #363 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [~] AutoThrottle: Increasing HTTP request concurrency to 10 (+1). [~] AutoThrottle: Average response time for this burst: 0.06357455555555556 [!] Client: ------------ [!] Client: Got response for request ID#: 363 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #364 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [~] AutoThrottle: Increasing HTTP request concurrency to 11 (+1). [~] AutoThrottle: Average response time for this burst: 0.05841550000000001 [!] Client: ------------ [!] Client: Got response for request ID#: 364 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #365 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [~] AutoThrottle: Increasing HTTP request concurrency to 12 (+1). [~] AutoThrottle: Average response time for this burst: 0.05422200000000001 [!] Client: ------------ [!] Client: Got response for request ID#: 365 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #366 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [~] AutoThrottle: Increasing HTTP request concurrency to 13 (+1). [~] AutoThrottle: Average response time for this burst: 0.05124791666666668 [!] Client: ------------ [!] Client: Got response for request ID#: 366 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #367 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [~] AutoThrottle: Increasing HTTP request concurrency to 14 (+1). [~] AutoThrottle: Average response time for this burst: 0.04871230769230771 [!] Client: ------------ [!] Client: Got response for request ID#: 367 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #368 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [~] AutoThrottle: Increasing HTTP request concurrency to 15 (+1). [~] AutoThrottle: Average response time for this burst: 0.04669342857142859 [!] Client: ------------ [!] Client: Got response for request ID#: 368 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #369 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [~] AutoThrottle: Increasing HTTP request concurrency to 16 (+1). [~] AutoThrottle: Average response time for this burst: 0.04494180000000001 [!] Client: ------------ [!] Client: Got response for request ID#: 369 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #370 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [~] AutoThrottle: Increasing HTTP request concurrency to 17 (+1). [~] AutoThrottle: Average response time for this burst: 0.04323962500000001 [!] Client: ------------ [!] Client: Got response for request ID#: 370 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #371 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [~] AutoThrottle: Increasing HTTP request concurrency to 18 (+1). [~] AutoThrottle: Average response time for this burst: 0.041737117647058834 [!] Client: ------------ [!] Client: Got response for request ID#: 371 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #372 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [~] AutoThrottle: Increasing HTTP request concurrency to 19 (+1). [~] AutoThrottle: Average response time for this burst: 0.04039144444444445 [!] Client: ------------ [!] Client: Got response for request ID#: 372 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #373 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [~] AutoThrottle: Increasing HTTP request concurrency to 20 (+1). [~] AutoThrottle: Average response time for this burst: 0.03922405263157895 [!] Client: ------------ [!] Client: Got response for request ID#: 373 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #374 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 374 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #375 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 375 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #376 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 376 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #377 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 377 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [!] BrowserCluster: Got job result: # @forwarder=#" @injector=nil>> @page=#>> [~] XSS: Checking results of deferred taint analysis. [*] XSS in script context: Analyzing response #378 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 378 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #379 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 379 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #380 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 380 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #381 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 381 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #383 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 383 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="JSESSIONID" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #384 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 384 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #385 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 385 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="JSESSIONID" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #388 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 388 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8Bscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8Bscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #382 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 382 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #390 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 390 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8Bscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8Bscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #386 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 386 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="JSESSIONID" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #387 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 387 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>""} seed="" affected-input-name="JSESSIONID" affected-input-value=""> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #389 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 389 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #391 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 391 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #392 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 392 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8Bscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8Bscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS: Analyzing response #394 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 394 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B"} seed="" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS: Analyzing response #395 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 395 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B()\"&%1'-;'"} seed="()\"&%1'-;'" affected-input-name="JSESSIONID" affected-input-value="95C73408E32EFF76D40D62F3A7F1FC8B()\"&%1'-;'"> [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:39 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:39 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS: Analyzing response #396 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/j_security_check' [!] Client: ------------ [!] Client: Got response for request ID#: 396 [!] Client: Performer: #"95C73408E32EFF76D40D62F3A7F1FC8B"} inputs={"JSESSIONID"=>"95C73408E32EFF76D40D62F3A7F1FC8B--> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 407 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 408 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 409 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 410 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 411 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 412 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 413 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 414 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 415 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 416 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 417 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 418 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 419 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 420 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 421 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 422 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 423 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 424 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 425 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 426 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 427 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 428 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 429 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="JSESSIONID" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 430 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 431 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="JSESSIONID" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 432 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="JSESSIONID" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 433 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>""} seed="" affected-input-name="JSESSIONID" affected-input-value=""> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 434 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 435 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 436 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 437 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 438 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 439 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: JSESSIONID [!] XSS: |--> Inputs: [!] XSS: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9" [*] XSS: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 440 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} seed="" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: JSESSIONID [!] XSS: |--> Inputs: [!] XSS: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9()\"&%1'-;'" [*] XSS: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 441 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9()\"&%1'-;'"} seed="()\"&%1'-;'" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9()\"&%1'-;'"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9()\"&%1'-;'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: JSESSIONID [!] XSS: |--> Inputs: [!] XSS: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9--> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: JSESSIONID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9 arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" [*] XSS in HTML tag: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 443 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9 arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="} seed=" arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9 arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9 arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: JSESSIONID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" [*] XSS in HTML tag: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 444 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"} seed="' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/a:cookie:["JSESSIONID"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: JSESSIONID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" [*] XSS in HTML tag: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 445 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""} seed="\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""> [!] Client: URL: https://myserver/a [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""} [!] Client: Train?: false [!] Client: ------------ [*] Harvesting HTTP responses... [~] Depending on server responsiveness and network conditions this may take a while. [!] Client: ------------ [!] Client: Got response for request ID#: 401 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a/%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 402 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a/%3E%22'%3E%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 403 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a/?%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E= [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 404 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a/?%3E%22%27%3E%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E= [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 405 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a/?=%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 406 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a/?=%3E%22%27%3E%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #407 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 407 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #408 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 408 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #409 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 409 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #410 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 410 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #411 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 411 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #412 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 412 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #413 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 413 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #414 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 414 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #415 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 415 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #416 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 416 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #417 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 417 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #418 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 418 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #419 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 419 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #437 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 437 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 446 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 447 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 400 [!] Client: Performer: nil [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:40 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:40 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #420 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 420 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #421 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 421 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #422 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 422 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #423 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 423 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #424 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 424 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #425 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 425 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #426 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 426 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #427 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 427 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #428 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 428 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #429 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 429 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="JSESSIONID" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #430 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 430 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #431 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 431 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="JSESSIONID" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #432 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 432 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="JSESSIONID" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #433 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 433 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>""} seed="" affected-input-name="JSESSIONID" affected-input-value=""> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #434 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 434 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #435 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 435 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #436 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 436 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #438 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 438 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #439 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 439 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS: Analyzing response #440 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 440 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} seed="" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS: Analyzing response #441 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 441 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9()\"&%1'-;'"} seed="()\"&%1'-;'" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9()\"&%1'-;'"> [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/a [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 Content-Type: text/html Content-Length: 690 Date: Wed, 06 May 2015 18:10:40 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Content-Type"=>"text/html", "Content-Length"=>"690", "Date"=>"Wed, 06 May 2015 18:10:40 GMT"} [!] Client: ------------ [*] XSS: Analyzing response #442 for cookie input 'JSESSIONID' pointing to: 'https://myserver/a' [!] Client: ------------ [!] Client: Got response for request ID#: 442 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9--> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 463 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 464 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 465 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 466 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 467 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 468 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 469 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 470 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 471 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 472 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 473 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 474 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 475 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 476 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 477 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 478 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 479 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 480 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 481 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 482 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 483 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 484 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 485 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="JSESSIONID" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 486 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 487 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="JSESSIONID" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 488 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="JSESSIONID" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 489 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>""} seed="" affected-input-name="JSESSIONID" affected-input-value=""> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 490 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 491 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 492 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 493 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 494 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 495 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: JSESSIONID [!] XSS: |--> Inputs: [!] XSS: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9" [*] XSS: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 496 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} seed="" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: JSESSIONID [!] XSS: |--> Inputs: [!] XSS: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9()\"&%1'-;'" [*] XSS: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 497 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9()\"&%1'-;'"} seed="()\"&%1'-;'" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9()\"&%1'-;'"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9()\"&%1'-;'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: JSESSIONID [!] XSS: |--> Inputs: [!] XSS: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9--> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: JSESSIONID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9 arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" [*] XSS in HTML tag: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 499 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9 arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="} seed=" arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9 arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9 arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: JSESSIONID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" [*] XSS in HTML tag: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 500 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"} seed="' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/Manager/index.html:cookie:["JSESSIONID"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: JSESSIONID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" [*] XSS in HTML tag: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 501 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""} seed="\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""> [!] Client: URL: https://myserver/Manager/index.html [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""} [!] Client: Train?: false [!] Client: ------------ [*] Harvesting HTTP responses... [~] Depending on server responsiveness and network conditions this may take a while. [!] Client: ------------ [!] Client: Got response for request ID#: 459 [!] Client: Performer: nil [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/?%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E= [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 460 [!] Client: Performer: nil [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/?%3E%22%27%3E%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E= [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 461 [!] Client: Performer: nil [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/?=%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 462 [!] Client: Performer: nil [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/?=%3E%22%27%3E%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #463 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 463 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #464 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 464 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #465 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 465 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #466 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 466 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #467 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 467 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #468 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 468 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #469 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 469 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 457 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 458 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/%3E%22'%3E%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 502 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 503 [!] Client: Performer: # [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 456 [!] Client: Performer: nil [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:10:56 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:10:56 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #476 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 476 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #477 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 477 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #478 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 478 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #479 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 479 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #480 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 480 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #481 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 481 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #482 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 482 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #483 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 483 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #484 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 484 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #485 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 485 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="JSESSIONID" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #486 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 486 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #487 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 487 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="JSESSIONID" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #488 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 488 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="JSESSIONID" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #489 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 489 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>""} seed="" affected-input-name="JSESSIONID" affected-input-value=""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #490 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 490 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #491 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 491 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #492 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 492 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #493 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 493 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #494 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 494 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #495 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 495 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS: Analyzing response #496 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 496 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} seed="" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS: Analyzing response #497 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 497 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9()\"&%1'-;'"} seed="()\"&%1'-;'" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9()\"&%1'-;'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/index.html [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Accept-Ranges: bytes ETag: W/"419-1427851520000" Last-Modified: Wed, 01 Apr 2015 01:25:20 GMT Content-Type: text/html Content-Length: 419 Date: Wed, 06 May 2015 18:10:56 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Accept-Ranges"=>"bytes", "Etag"=>"W/\"419-1427851520000\"", "Last-Modified"=>"Wed, 01 Apr 2015 01:25:20 GMT", "Content-Type"=>"text/html", "Content-Length"=>"419", "Date"=>"Wed, 06 May 2015 18:10:56 GMT"} [!] Client: ------------ [*] XSS: Analyzing response #498 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/index.html' [!] Client: ------------ [!] Client: Got response for request ID#: 498 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9--> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 520 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="type" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 521 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="type" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 522 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="type" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 523 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="type" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 524 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="type" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 525 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="type" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 526 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="type" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 527 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="type" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 528 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="type" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 529 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="type" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 530 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="type" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 531 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="type" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 532 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="type" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 533 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="type" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 534 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="type" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 535 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="type" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 536 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="type" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 537 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="type" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 538 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="type" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 539 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="type" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 540 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="type" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 541 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="type" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 542 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="type" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 543 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="type" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 544 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="type" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 545 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="type" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: type [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "type" => "" [*] XSS in script context: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 546 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>""} seed="" affected-input-name="type" affected-input-value=""> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>""} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 547 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 548 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 549 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 550 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 551 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 552 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 553 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 554 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 555 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 556 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 557 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 558 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 559 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => ";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 560 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 561 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 562 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 563 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 564 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 565 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 566 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 567 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 568 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 569 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="JSESSIONID" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 570 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 571 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="JSESSIONID" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 572 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="JSESSIONID" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in script context: About to audit: Arachni::Checks::XssScriptContext:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in script context: Trainer set to: OFF [!] XSS in script context: [!] XSS in script context: Formatting set to: [!] XSS in script context: | [!] XSS in script context: |----> Straight, leave as is (Format::STRAIGHT [1]). [Format mask: 1] [!] XSS in script context: | [!] XSS in script context: |--> Auditing: JSESSIONID [!] XSS in script context: |--> Inputs: [!] XSS in script context: |----> "JSESSIONID" => "" [*] XSS in script context: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 573 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>""} seed="" affected-input-name="JSESSIONID" affected-input-value=""> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>""} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: type [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "type" => "NOT_FOUNDscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 574 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUNDscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="type" affected-input-value="NOT_FOUNDscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"NOT_FOUNDscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: type [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "type" => "NOT_FOUND;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 575 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUND;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="type" affected-input-value="NOT_FOUND;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"NOT_FOUND;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: type [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "type" => "NOT_FOUNDscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 576 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUNDscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="type" affected-input-value="NOT_FOUNDscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"NOT_FOUNDscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: type [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "type" => "NOT_FOUND\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 577 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUND\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="type" affected-input-value="NOT_FOUND\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"NOT_FOUND\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: type [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "type" => "NOT_FOUNDscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 578 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUNDscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="type" affected-input-value="NOT_FOUNDscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"NOT_FOUNDscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: type [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "type" => "NOT_FOUND';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 579 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUND';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="type" affected-input-value="NOT_FOUND';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"NOT_FOUND';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 580 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 581 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 582 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 583 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 584 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML element event attribute: About to audit: Arachni::Checks::XssEvent:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in HTML element event attribute: Trainer set to: OFF [!] XSS in HTML element event attribute: [!] XSS in HTML element event attribute: Formatting set to: [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML element event attribute: | [!] XSS in HTML element event attribute: |--> Auditing: JSESSIONID [!] XSS in HTML element event attribute: |--> Inputs: [!] XSS in HTML element event attribute: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" [*] XSS in HTML element event attribute: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 585 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: type [!] XSS: |--> Inputs: [!] XSS: |----> "type" => "NOT_FOUND" [*] XSS: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 586 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUND"} seed="" affected-input-name="type" affected-input-value="NOT_FOUND"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"NOT_FOUND"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: type [!] XSS: |--> Inputs: [!] XSS: |----> "type" => "NOT_FOUND()\"&%1'-;'" [*] XSS: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 587 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUND()\"&%1'-;'"} seed="()\"&%1'-;'" affected-input-name="type" affected-input-value="NOT_FOUND()\"&%1'-;'"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"NOT_FOUND()\"&%1'-;'"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: type [!] XSS: |--> Inputs: [!] XSS: |----> "type" => "NOT_FOUND--> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: JSESSIONID [!] XSS: |--> Inputs: [!] XSS: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9" [*] XSS: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 589 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} seed="" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: JSESSIONID [!] XSS: |--> Inputs: [!] XSS: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9()\"&%1'-;'" [*] XSS: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 590 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9()\"&%1'-;'"} seed="()\"&%1'-;'" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9()\"&%1'-;'"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9()\"&%1'-;'"} [!] Client: Train?: false [!] Client: ------------ [!] XSS: About to audit: Arachni::Checks::Xss:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS: Trainer set to: OFF [!] XSS: [!] XSS: Formatting set to: [!] XSS: | [!] XSS: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS: | [!] XSS: |--> Auditing: JSESSIONID [!] XSS: |--> Inputs: [!] XSS: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9--> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: type [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "type" => "NOT_FOUND arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" [*] XSS in HTML tag: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 592 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUND arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="} seed=" arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" affected-input-name="type" affected-input-value="NOT_FOUND arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"NOT_FOUND arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: type [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "type" => "NOT_FOUND' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" [*] XSS in HTML tag: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 593 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUND' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"} seed="' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" affected-input-name="type" affected-input-value="NOT_FOUND' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"NOT_FOUND' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/Manager/GlobalDialog:link:["type"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: type [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "type" => "NOT_FOUND\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" [*] XSS in HTML tag: Auditing link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 594 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUND\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""} seed="\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" affected-input-name="type" affected-input-value="NOT_FOUND\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""> [!] Client: URL: https://myserver/Manager/GlobalDialog [!] Client: Method: get [!] Client: Params: {"type"=>"NOT_FOUND\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: JSESSIONID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9 arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" [*] XSS in HTML tag: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 595 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9 arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="} seed=" arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah=" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9 arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9 arachni_xss_in_tag=6084f136be21a63768e6b49e041de7e5 blah="} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: JSESSIONID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" [*] XSS in HTML tag: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 596 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"} seed="' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9' arachni_xss_in_tag='6084f136be21a63768e6b49e041de7e5' blah='"} [!] Client: Train?: false [!] Client: ------------ [!] XSS in HTML tag: About to audit: Arachni::Checks::XssTag:https://myserver/Manager/GlobalDialog?type=NOT_FOUND:cookie:["JSESSIONID"]: [!] XSS in HTML tag: Trainer set to: OFF [!] XSS in HTML tag: [!] XSS in HTML tag: Formatting set to: [!] XSS in HTML tag: | [!] XSS in HTML tag: |----> Append to default value (Format::APPEND [2]). [Format mask: 2] [!] XSS in HTML tag: | [!] XSS in HTML tag: |--> Auditing: JSESSIONID [!] XSS in HTML tag: |--> Inputs: [!] XSS in HTML tag: |----> "JSESSIONID" => "AAA7AA7CD1CA9D393C76157F42BD79F9\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" [*] XSS in HTML tag: Auditing cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Queued request. [!] Client: ID#: 597 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""} seed="\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\"" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""> [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Method: get [!] Client: Params: {} [!] Client: Body: [!] Client: Headers: {"Accept"=>"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "User-Agent"=>"Arachni/v1.1"} [!] Client: Cookies: {"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9\" arachni_xss_in_tag=\"6084f136be21a63768e6b49e041de7e5\" blah=\""} [!] Client: Train?: false [!] Client: ------------ [*] Harvesting HTTP responses... [~] Depending on server responsiveness and network conditions this may take a while. [!] Client: ------------ [!] Client: Got response for request ID#: 514 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog/%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 515 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog/%3E%22'%3E%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 516 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog/?%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E= [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 517 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog/?%3E%22%27%3E%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E= [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 518 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog/?=%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 519 [!] Client: Performer: nil [!] Client: Status: 404 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog/?=%3E%22%27%3E%3Cmy_tag_6084f136be21a63768e6b49e041de7e5/%3E [!] Client: Headers: HTTP/1.1 404 Not Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [!] Client: ------------ [!] Client: Got response for request ID#: 504 [!] Client: Performer: nil [!] Client: Status: 500 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/j_security_check [!] Client: Headers: HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT Connection: close [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT", "Connection"=>"close"} [!] Client: ------------ [*] XSS in script context: Analyzing response #520 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 520 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="type" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #521 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 521 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="type" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #522 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 522 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="type" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #523 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 523 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="type" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #524 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 524 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="type" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #525 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 525 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="type" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #526 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 526 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="type" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #527 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 527 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="type" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #528 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 528 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="type" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #533 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 533 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="type" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #534 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 534 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="type" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #535 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 535 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="type" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #536 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 536 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="type" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #537 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 537 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="type" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #538 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 538 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="type" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #547 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 547 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="javascript:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #540 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 540 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="type" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #541 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 541 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="type" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #542 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 542 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="type" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #543 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 543 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="type" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #539 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 539 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="type" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #544 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 544 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="type" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #545 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 545 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="type" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #546 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 546 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>""} seed="" affected-input-name="type" affected-input-value=""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #549 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 549 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #550 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 550 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()'//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #551 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 551 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #552 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 552 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"} seed="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//" affected-input-name="JSESSIONID" affected-input-value="';window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();'//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #553 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 553 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #554 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 554 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()\"//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #555 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 555 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #556 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 556 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"} seed="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//" affected-input-name="JSESSIONID" affected-input-value="\";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();\"//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #557 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 557 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #558 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 558 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #559 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 559 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #560 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 560 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value=";window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #561 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 561 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #562 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 562 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #563 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 563 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #564 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 564 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #565 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 565 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #566 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 566 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #567 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 567 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #568 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 568 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"} seed="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//" affected-input-name="JSESSIONID" affected-input-value="1;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink();//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #569 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 569 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"} seed="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*" affected-input-name="JSESSIONID" affected-input-value="*/;\nwindow.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()/*"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #570 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 570 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"} seed="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()" affected-input-name="JSESSIONID" affected-input-value="window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink()"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #571 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 571 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""} seed="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\"" affected-input-name="JSESSIONID" affected-input-value="\",x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:\""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #572 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 572 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"} seed="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'" affected-input-name="JSESSIONID" affected-input-value="',x:window.top._arachni_js_namespace_taint_tracer.log_execution_flow_sink(),y:'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in script context: Analyzing response #573 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 573 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>""} seed="" affected-input-name="JSESSIONID" affected-input-value=""> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #574 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 574 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUNDscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="type" affected-input-value="NOT_FOUNDscript:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #575 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 575 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUND;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="type" affected-input-value="NOT_FOUND;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #576 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 576 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUNDscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="type" affected-input-value="NOT_FOUNDscript:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #577 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 577 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUND\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="type" affected-input-value="NOT_FOUND\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #578 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 578 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUNDscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="type" affected-input-value="NOT_FOUNDscript:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #580 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 580 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9script:;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #581 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 581 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed=";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9;arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #582 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 582 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9script:\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #583 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 583 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9\";arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #584 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 584 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9script:';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #585 for cookie input 'JSESSIONID' pointing to: 'https://myserver/Manager/GlobalDialog?type=NOT_FOUND' [!] Client: ------------ [!] Client: Got response for request ID#: 585 [!] Client: Performer: #"AAA7AA7CD1CA9D393C76157F42BD79F9"} inputs={"JSESSIONID"=>"AAA7AA7CD1CA9D393C76157F42BD79F9';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="JSESSIONID" affected-input-value="AAA7AA7CD1CA9D393C76157F42BD79F9';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=NOT_FOUND [!] Client: Headers: HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS in HTML element event attribute: Analyzing response #579 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [!] Client: ------------ [!] Client: Got response for request ID#: 579 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUND';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"} seed="';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//" affected-input-name="type" affected-input-value="NOT_FOUND';arachni_xss_in_element_event=6084f136be21a63768e6b49e041de7e5//"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS: Analyzing response #586 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [~] XSS: Progressing to deferred browser evaluation of response. [!] BrowserCluster: Queueing: # Symantec Data Loss Prevention
@taint="" @injector=nil> [!] Client: ------------ [!] Client: Got response for request ID#: 586 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUND"} seed="" affected-input-name="type" affected-input-value="NOT_FOUND"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [!] BrowserCluster Worker#86888910: Started: # Symantec Data Loss Prevention
@taint="" @injector=nil> [*] XSS: Analyzing response #587 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [~] XSS: Progressing to deferred browser evaluation of response. [!] BrowserCluster: Queueing: # Symantec Data Loss Prevention
@taint="" @injector=nil> [!] Client: ------------ [!] Client: Got response for request ID#: 587 [!] BrowserCluster Worker#86888910: Started: # Symantec Data Loss Prevention
@taint="" @injector=nil> [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUND()\"&%1'-;'"} seed="()\"&%1'-;'" affected-input-name="type" affected-input-value="NOT_FOUND()\"&%1'-;'"> [!] Client: Status: 200 [!] Client: Code: ok [!] Client: Message: No error [!] Client: URL: https://myserver/Manager/GlobalDialog?type=ERROR [!] Client: Headers: HTTP/1.1 302 Found Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Location: https://myserver/Manager/GlobalDialog?type=ERROR Content-Language: en-US Content-Length: 0 Date: Wed, 06 May 2015 18:11:10 GMT HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="COM CNT INT CAO CUR ADM OUR IND" Pragma: No-cache Cache-Control: no-cache,no-store,max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html;charset=utf-8 Content-Language: en-US Transfer-Encoding: chunked Date: Wed, 06 May 2015 18:11:10 GMT [!] Client: Parsed headers: {"Server"=>"Apache-Coyote/1.1", "P3p"=>"CP=\"COM CNT INT CAO CUR ADM OUR IND\"", "Pragma"=>"No-cache", "Cache-Control"=>"no-cache,no-store,max-age=0", "Expires"=>"Thu, 01 Jan 1970 00:00:00 GMT", "Content-Type"=>"text/html;charset=utf-8", "Content-Language"=>"en-US", "Transfer-Encoding"=>"chunked", "Date"=>"Wed, 06 May 2015 18:11:10 GMT"} [!] Client: ------------ [*] XSS: Analyzing response #588 for link input 'type' pointing to: 'https://myserver/Manager/GlobalDialog' [~] XSS: Progressing to deferred browser evaluation of response. [!] BrowserCluster: Queueing: # Symantec Data Loss Prevention
@taint="" @injector=nil> [!] Client: ------------ [!] Client: Got response for request ID#: 588 [!] Client: Performer: #"NOT_FOUND"} inputs={"type"=>"NOT_FOUND-->