Author Topic: Would not expect such insecurity on a marketing developer site!  (Read 1198 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34067
  • malware fighter
2 vulnerable jQuery libraries detected: -http://www.webpower.eu/nl/
Detected libraries:
jquery-migrate - 1.2.1 : -http://www.webpower.eu/nl/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery - 1.11.3 : -http://www.webpower.eu/nl/wp-includes/js/jquery/jquery.js?ver=1.11.3
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery.prettyPhoto - 3.1.6 : -http://www.webpower.eu/nl/wp-content/themes/brazil-wp/js/jquery.prettyPhoto.js
2 vulnerable libraries detected

WordPress with issues and also outdated!
WordPress Version
4.4.2

WordPress plug-in outdated: WordPress Plugins
The following plugins were detected by reading the HTML source of the WordPress sites front page.

html-social-share-buttons   latest release (2.1.14)
http://wordpress.org/plugins/html-social-share-buttons/
js_composer   
contact-form-7 4.4   latest release (4.4.1) Update required
http://contactform7.com/
revslider
Version does not appear to be latest 4.5 - update now

Warning User Enumeration is possible  :o
The first two user ID's were tested to determine if user enumeration is possible.

ID   User           Login
1   None   webpower
2   None   monique
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.

See: http://toolbar.netcraft.com/site_report?url=http://www.webpower.eu

From the Crypto-report: www.webpower.eu
You have 1 error
Wrong certificate installed.
The domain name does not match the certificate common name or SAN.
Warnings
BEAST
The BEAST attack is not mitigated on this server.
Certificate information
This server uses a Domain Validated (DV) certificate. No information about the site owner has been validated. Data is protected, but exchanging personal or financial information is not recommended.
Common name:
 *.site4u.nl
SAN:
 *.site4u.nl, site4u.nl
Valid from:
 2014-Oct-30 06:55:00 GMT
Valid to:
 2017-Jun-18 22:01:21 GMT
Certificate status:
 Valid
Revocation check method:
 OCSP
Organization:
 
Organizational unit:
 Domain Control Validated - RapidSSL(R),See www.rapidssl.com/resources/cps (c)14,GT57158672
City/locality:
 
State/province:
 
Country:
 
Certificate Transparency:
 Not Enabled
Serial number:
 63ee
Algorithm type:
 SHA256withRSA
Key size:
 2048
Certificate chainShow details
RapidSSL SHA256 CA - G3Intermediate certificate
*.site4u.nlTested certificate

A meagre F-Status here: https://securityheaders.io/?q=https%3A%2F%2Fwww.webpower.eu%2Fnl%2F

Rate not applicable: https://sritest.io/#report/49ba38e4-8ffa-4203-86a8-d268eece1cdf

Alo see: https://seomon.com/domain/www.webpower.eu/

 line:81: SyntaxError: invalid label:
          error: line:81: ;{"@context":"http:\/\/schema.org","@type":"WebSite","url":"-http:\/\/www.webpower.eu\/nl\/","name":"Webpower marketing automation","potentialAction":{"@type":"SearchAction","target":"-http:\/\/www.webpower.eu\/nl\/?s={string}","query-input":"re
          error: line:81: ..^
     error: line:3: SyntaxError: missing = in XML attribute:
          error: line:3: <!DOCTYPE html>
          error: line:3: ..............^

Possibly suspicious iFrame code detected here: http://www.domxssscanner.com/scan?url=https%3A%2F%2Fwww.facebook.com%2Fplugins%2Flike.php%3Flocale%3DUS%26href%3D%7Bhref%7D%26layout%3Dcount%26faces%3Dtrue%26width%3D500%26action%3Dlike%26font%26colorscheme%3Dlight%26height%3D23

polonus (volunteer website security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!