Avast WEBforum

Other => Viruses and worms => Topic started by: polonus on March 28, 2017, 07:27:24 PM

Title: And once again Word Press insecurity as cause of malcode on website......
Post by: polonus on March 28, 2017, 07:27:24 PM
See: http://urlquery.net/report.php?id=1490719524868
WordPress Version
4.5.7
Version does not appear to be latest 4.7.3 - update now.

WordPress Plugins
The following plugins were detected by reading the HTML source of the WordPress sites front page.

simple-share-buttons-adder 6.1.5   latest release (6.3.4) Update required
https://simplesharebuttons.com
bsk-pdf-manager 1.5.2   latest release (1.7.1) Update required
bbpress 2.5.9   latest release (2.5.12) Update required
https://bbpress.org
Plugins are a source of many security vulnerabilities within WordPress installations, always keep them updated to the latest version available and check the developers plugin page for information about security related updates and fixes.

Two vulnerable jQuery libraries to be retired: http://retire.insecurity.today/#!/scan/59cf89ece9a9c4aea55ce3c15afbf67376660a1cbee8bc2f03e5b09c662d3bfa

1 issue with Stylesheet: https://sritest.io/#report/5e1864bc-762d-4132-b97f-95abdf5fd092

F-Status: https://observatory.mozilla.org/analyze.html?host=www.huddleproductions.com

GoDaddy abuse: https://urlscan.io/result/cdda285d-2507-4f73-a289-517f51f87c74#summary

Malware on same IP: https://www.scumware.org/report/stormwatcher.us.html

Vuln.: Results from scanning URL: -http://www.huddleproductions.com/wp-content/themes/enfold/js/avia.js?ver=1
Number of sources found: 26
Number of sinks found: 16

Re: -> https://urlscan.io/result/cdda285d-2507-4f73-a289-517f51f87c74/dom/
errors in script
Quote
found JavaScript
     error: line:4: SyntaxError: invalid assignment left-hand side:
          error: line:4: window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/72x72\/","ext":".png","source":{"concatemoji":"http:\/\/wXw.huddleproductions.com\/wp-includes\/js\/wp-emoji-release.min.js?ver=4.5.7"}};
          error: line:4: ............................^

polonus (volunteer website security analyst and website error-hunter)
Title: Re: And once again Word Press insecurity - ask com toolbar crap via twitter?
Post by: polonus on March 29, 2017, 02:45:35 PM
Another one presented here with 44 instances of malcode: http://urlquery.net/report.php?id=1490787142698
Quttera's flags this as potentially suspicious script: /wp-content/themes/hq/js/main.js?ver=4.1.16
Severity:   Potentially Suspicious
Reason:   Detected procedure that is commonly used in suspicious activity.
Quote
Details:   Too low entropy detected in string [['.moveFromLeft, .moveFromRight, .moveFromTop, .moveFromBottom, .fadeIn, .fadeFromLeft, .fadeFromRight']] of length 131 which may point to obfuscation or shellcode.
(script) platform.twitter.com/widgets.js
     status: (referer=-http:/www.ask.com/web?q=puppies)saved 115585 bytes d0b4f241d1c4285709d032b3ee3ea65de5883ace
     info: [decodingLevel=0] found JavaScript
     suspicious: maxruntime exceeded 10 seconds (incomplete) 0 bytes
     file: d0b4f241d1c4285709d032b3ee3ea65de5883ace: 115585 bytes
     file: 2c07d11cd0c3af6b6b6a6c0966763b1d55bddb58: 115801 bytes
     file: 0678b7d40071ba155fcc76185527985890fecea2: 115807 bytes
     file: f10cd9aa9acadb31e5f14e0d8a2e25f818105009: 116016 bytes
     file: 08f98498bbe46e337ecf40f24e7ff3aa31651da6: 116208 bytes
     file: 88322cf42e4f3fcd3ace00dfd6770d0a4b213e45: 115922 bytes
     file: 50f6341066895f249d4ede982dba5114d79a7b57: 116046 bytes

Threat dump MD5:   2200EA0B37F930CC4BB32B8AB23ABCD1
File size[byte]:   197271
File type:   ASCII
Page/File MD5:   EED27F57F2B663657929E57568E3177F
Scan duration[sec]:   22.701000  -> http://www.domxssscanner.com/scan?url=http%3A%2F%2Ftethysresorts.com

WordPress version outdated: Upgrade required.
Outdated WordPress Found: WordPress under 4.7.3  Word-Press self-hosted -> http://toolbar.netcraft.com/site_report?url=+tethysresorts.com

3 jQuery libararies to be retired: http://retire.insecurity.today/#!/scan/c60dca7896fd64e178eee977174e7ae13a2e69456580e39ba3242b84210b8fcd

C-status 5 issues: https://sritest.io/#report/59114b92-9f4f-40a1-964d-4120aad7b953

F-status: https://observatory.mozilla.org/analyze.html?host=tethysresorts.com

polonus (volunteer website security analyst and website error-hunter)