Author Topic: False Positive on Newegg?  (Read 2850 times)

0 Members and 1 Guest are viewing this topic.

REDACTED

  • Guest
False Positive on Newegg?
« on: October 20, 2016, 07:08:19 AM »
The link (currently marked out is: hxxp://www.newegg.com/Product/Product.aspx?Item=N82E16824025100 ). I was browsing Newegg and when I reached this product Avast Webshield gave me two blocked alerts. I checked it on Virus Total and it came up clean. Scanned the computer and nothing popped up. Submitted for FP but if it's not, let me know.

Virustotal report: https://www.virustotal.com/en/url/c3a2bd09b883751d36e9a4e1858fe102f55d0b7a445b16f7c04f006a6acf7c46/analysis/

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37626
  • Not a avast user
Re: False Positive on Newegg?
« Reply #1 on: October 20, 2016, 07:47:21 AM »
« Last Edit: October 20, 2016, 08:09:50 AM by Pondus »

REDACTED

  • Guest
Re: False Positive on Newegg?
« Reply #2 on: October 20, 2016, 07:55:53 AM »
Here is the log file. What's the verdict?
« Last Edit: October 20, 2016, 08:21:03 AM by yellowfox101 »

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37626
  • Not a avast user
Re: False Positive on Newegg?
« Reply #3 on: October 20, 2016, 08:37:04 AM »
seems to be a URL block, anyway only avast can answer why

also the URL in your log is not the one posted above


« Last Edit: October 20, 2016, 08:39:00 AM by Pondus »

REDACTED

  • Guest
Re: False Positive on Newegg?
« Reply #4 on: October 20, 2016, 08:39:02 AM »
It was a URL block. Was it a false positive or did someone potentially hijack the page?

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37626
  • Not a avast user
Re: False Positive on Newegg?
« Reply #5 on: October 20, 2016, 08:42:02 AM »
It was a URL block. Was it a false positive or did someone potentially hijack the page?
There are many reasons for a block, website does not have to be infected


REDACTED

  • Guest
Re: False Positive on Newegg?
« Reply #6 on: October 20, 2016, 08:44:21 AM »
Ah, alright. Thank you for looking into it.

Offline HonzaZ

  • Avast team
  • Advanced Poster
  • *
  • Posts: 1038
Re: False Positive on Newegg?
« Reply #7 on: October 20, 2016, 10:17:58 AM »
This was caused by a false positive detection on 72.21.91.8. The detection was out today, from 6:21 to 6:45, CEST.
In other words, everything is fine, there was no risk of infection, and no action is needed :)

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33939
  • malware fighter
Re: False Positive on Newegg?
« Reply #8 on: October 20, 2016, 01:45:03 PM »
The main domain and www-subdomain may not be malicious as such,
but that site has alerts for cloaking, which is often not a good sign.
It further has spammy looking links and iFrame (hopefully same origin).

htxp://secure.newegg.com is contradictory (http versus https?). Warning:
Root installed on the server.
For best practices, remove the self-signed root from the server.

So not the strongest server configuration newegg server:
Secure Renegotiation:
 Enabled
Downgrade attack prevention:
 Not Enabled
Next Protocol Negotiation:
 Not Enabled
Session resumption (caching):
 Enabled
Session resumption (tickets):
 Not Enabled
Strict Transport Security (HSTS):
 Not Enabled
SSL/TLS compression:
 Not Enabled
Heartbeat (extension):
 Not Enabled
RC4:
 Not Enabled
OCSP stapling:
 Not Enabled

A fileview scan sees potential problems: The scan has detected some potential problems in these files. First scroll down through the code listed out after the list of links, this is the code returned by the request for the URL you entered and check for any problems. Next, these link(s) will open the individual URL(s) in this tool, check through the code that is returned, compare the code being returned to a known clean copy, etc.

1 -> images10.newegg.com/WebResource/Scripts/USA/Common/PageDisplayLib.v1.w.12809.5.js
2 -> images10.newegg.com/WebResource/Scripts/USA/Common/BizCommon.v1.w.13375.5.e0.js
3 -> images10.newegg.com/WebResource/Scripts/USA/WWW/Product.v1.w.13225.0.js

In the source code we point at line 60 with ]if(top.location!= self.location ) etc.

HttpOnly cookie alert: Result
It looks like 2 cookies are being set without the "HttpOnly" flag being set (name : value):

NV%5FCONFIGURATION : #5%7b%22Sites%22%3a%7b%22USA%22%3a%7b%22Values%22%3a%7b%22w57%22%3a%22USA%22%2c%22w58%22%3a%22USD%22%2c%22w44%22%3a%22-1%22%2c%22w45%22%3a%22-1%22%2c%22wd%22%3a%220%22%7d%2c%22Exp%22%3a%221563362944%22%7d%7d%7d
NV%5FDVINFO : #5%7b%22Sites%22%3a%7b%22USA%22%3a%7b%22Values%22%3a%7b%22w19%22%3a%22Y%22%7d%2c%22Exp%22%3a%221477049344%22%7d%7d%7d
Unless the cookie legitimately needs to be read by JavaScript on the client, the "HttpOnly" flag should always be set to ensure it cannot be read by the client and used in an XSS attack + Clickjacking Warning.

Meagre F results here: https://observatory.mozilla.org/analyze.html?host=www.newegg.com

Retirable code: -http://www.newegg.com
Detected libraries:
jquery - 1.10.2 : (active1) -http://images10.newegg.com/WebResource/Scripts/USA/TP_jQueryPlugin/jquery-1.10.2.min.js?purge=1
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery-migrate - 1.2.1 : -http://images10.newegg.com/WebResource/Scripts/USA/TP_jQueryPlugin/jquery-migrate-1.2.1.min.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery - 1.6.4 : http://d3v27wwd40f0xu.cloudfront.net/js/newegg_bootstrap.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
(active) - the library was also found to be active by running code
3 vulnerable libraries detected

DOM XSS vuln.: Results from scanning URL: hxtp://images10.newegg.com/WebResource/Scripts/USA/TP_Cretio/criteo_ld.js
Number of sources found: 11
Number of sinks found: 3
Stiil vuln. to Criteo Flash exploit? - earlier angler exploit vuln.

Just like HonzaZ says, website may not be malicious per se at this moment,
but if I could give away points for it's security status it would only get a meagre 38 out on a scale of 100.

Ask newegg web administration to do a better job of it!

polonus (volunteer website security analyst and website error-hunter)
« Last Edit: October 20, 2016, 03:53:54 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!