Author Topic: My site still blocked by avast - cleanead up  (Read 4045 times)

0 Members and 1 Guest are viewing this topic.

REDACTED

  • Guest
My site still blocked by avast - cleanead up
« on: November 16, 2015, 09:46:19 PM »
Hello,

So i have received many alerts that's my website could be infected by malware etc. I got people to clean code & everything up, and we are 100% sure that my code is perfectly clean. But avast is still blocking visitors to enter my website:

idosk8.com

Where can I ask Avast to reanalyze the website, update it's data base and let people in again?

Thank you.

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37698
Re: My site still blocked by avast - cleanead up
« Reply #1 on: November 16, 2015, 09:50:58 PM »
It seems they did a bad clean up job     https://sitecheck.sucuri.net/results/idosk8.com


REDACTED

  • Guest
Re: My site still blocked by avast - cleanead up
« Reply #2 on: November 16, 2015, 09:54:39 PM »
I tried to view the link of Sucuri's MW:JS:GEN2?web.js.malware.fake_jquery.001 definition page and my Avast popped up a JS.LLLredir-AQ[Trj] blocking warning and Firefox denied access.  :o
« Last Edit: November 16, 2015, 09:57:53 PM by Pernaman »

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37698
Re: My site still blocked by avast - cleanead up
« Reply #3 on: November 16, 2015, 10:00:36 PM »
Because Sucuri display malware code samples on the website   ;)

« Last Edit: November 16, 2015, 10:03:06 PM by Pondus »


Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34049
  • malware fighter
Re: My site still blocked by avast - cleanead up
« Reply #5 on: November 16, 2015, 11:42:36 PM »
You have three vulnerable script libraries running there at -http://idosk8.com
Detected libraries:
jquery-migrate - 1.2.1 : -http://idosk8.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery - 1.11.3 : -http://idosk8.com/wp-includes/js/jquery/jquery.js?ver=1.11.3
jquery - 1.8.1 : -http://ajax.googleapis.com/ajax/libs/jquery/1.8.1/jquery.min.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery - 1.10.2 : -http://ajax.googleapis.com/ajax/libs/jquery/1.10.2/jquery.min.js
jquery - 1.8.3 : -http://player.ooyala.com/v3/281bc476baa343bc91db3aeaf6f1a2f5?platform=html5-priority
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
swfobject - 2.2 : -http://player.ooyala.com/v3/281bc476baa343bc91db3aeaf6f1a2f5?platform=html5-priority
3 vulnerable libraries detected

Open to pharmaspam is Results from scanning URL: -http://idosk8.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
Number of sources found: 0
Number of sinks found: 3

Are all plug-ins updated and patched or is there left code?
WordPress Plugins
The following plugins were detected by reading the HTML source of the WordPress sites front page.

wp-postratings 1.82   latest release (1.82)
http://lesterchan.net/portfolio/programming/php/
qtranslate 2.5.39   
wp-polls 2.70   latest release (2.70)
http://lesterchan.net/portfolio/programming/php/
captcha 4.1.5   latest release (4.1.5)
http://bestwebsoft.com/products/
akismet   latest release (3.1.5)
http://akismet.com/
most-shared-posts 1.1.0   latest release (1.1.0)
http://www.tomanthony.co.uk/wordpress-plugins/most-shared-posts/
contact-form-7 4.3   latest release (4.3)
http://contactform7.com/

User Enumeration is possible...  for instance the admin log-in.... It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.

Improve security and retire the outdated script libraries. We are volunteers here and no Avast Team Members. Only an Avast Team Member may unblock your website. You may have to wait for a reaction from one of them or report to
them directly.

polonus (volunteer website security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

REDACTED

  • Guest
Re: My site still blocked by avast - cleanead up
« Reply #6 on: November 17, 2015, 12:22:39 PM »
Could you please check my site? Avast is blocking it but I've run a number of online screening and they don't detect anything.

http://resto-web.es


Thanks

Offline Eddy

  • Avast Evangelist
  • Maybe Bot
  • ***
  • Posts: 31073
  • Watching (over?) you
    • Malware removal, Biljart and other things.
Re: My site still blocked by avast - cleanead up
« Reply #7 on: November 17, 2015, 12:46:08 PM »
balicorreo,

please start your own thread and make the link not clickable.

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37698
Re: My site still blocked by avast - cleanead up
« Reply #8 on: November 17, 2015, 12:48:03 PM »
Could you please check my site? Avast is blocking it but I've run a number of online screening and they don't detect anything.

http://resto-web.es


Thanks
INFECTED  https://sitecheck.sucuri.net/results/resto-web.es


Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34049
  • malware fighter
Re: My site still blocked by avast - cleanead up
« Reply #9 on: November 17, 2015, 03:02:02 PM »
There is a security issue with your WordPress configuration: Warning Directory Indexing Enabled
In the test we attempted to list the directory contents of the uploads and plugins folders to determine if Directory Indexing is enabled. This is an information leakage vulnerability that can reveal sensitive information regarding your site configuration or content.

/wp-content/uploads/ enabled

Check plug-ins for updates or whether the code has been left by developer:
The following plugins were detected by reading the HTML source of the WordPress sites front page.




plugin_photogallery   
asesor-cookies-para-la-ley-en-espana   latest release (0.21)
http://webartesanal.com
jetpack   latest release (3.8.0)
http://jetpack.me
dropdown-menu-widget   latest release (1.9.4)
http://shailan.com/wordpress/plugins/dropdown-menu
addthis   latest release (5.2.0)
http://www.addthis.com
google-analyticator   latest release (6.4.9.6)
http://www.videousermanuals.com/google-analyticator/
wp-lightbox-2   latest release (3.0.5)
http://wpdevart.com/wordpress-lightbox-plugin
hot_gallery   
hot_carousel

Code to be retired, because vulnerable!
Detected libraries:
jquery-migrate - 1.2.1 : -http://resto-web.es/wp-includes/js/jquery/jquery-migrate.min.js?ver=9a4f648a3502a71b116f51b951da98ef
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery - 1.11.3 : (active1) -http://resto-web.es/wp-includes/js/jquery/jquery.js?ver=9a4f648a3502a71b116f51b951da98ef
(active) - the library was also found to be active by running code
1 vulnerable library detected
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!