Author Topic: Website reported as blocked for URL:Mal, report false infection?  (Read 24000 times)

0 Members and 1 Guest are viewing this topic.

Offline Asyn

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 64752
    • >>>  Avast Forum - Deutschsprachiger Bereich  <<<
Re: Website reported as blocked for URL:Mal, report false infection?
« Reply #75 on: September 11, 2018, 08:27:35 AM »
You're welcome. (Usually rather quick, few hours at most)
Win 8.1 [x64] - Avast PremSec 20.4.2410.B#5 [UI.520] - CC 5.65 - EEK - FF ESR 68.8 [NS/AOS/uBO/PB] - TB 68.8.1 - ASB/ACP/ASL.BC
Deutschsprachiger Bereich -> Avast Wissenswertes (Downloads, Anleitungen & Infos): https://forum.avast.com/index.php?topic=60523.0

Offline dyang

  • Newbie
  • *
  • Posts: 5
Re: Website reported as blocked for URL:Mal, report false infection?
« Reply #76 on: September 11, 2018, 08:30:12 AM »
You're welcome. (Usually rather quick, few hours at most)
Thank you!

Offline Asyn

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 64752
    • >>>  Avast Forum - Deutschsprachiger Bereich  <<<
Re: Website reported as blocked for URL:Mal, report false infection?
« Reply #77 on: September 11, 2018, 08:31:16 AM »
No problem.
Win 8.1 [x64] - Avast PremSec 20.4.2410.B#5 [UI.520] - CC 5.65 - EEK - FF ESR 68.8 [NS/AOS/uBO/PB] - TB 68.8.1 - ASB/ACP/ASL.BC
Deutschsprachiger Bereich -> Avast Wissenswertes (Downloads, Anleitungen & Infos): https://forum.avast.com/index.php?topic=60523.0

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 32449
  • malware fighter
Re: Website reported as blocked for URL:Mal, report false infection?
« Reply #78 on: September 11, 2018, 11:50:11 PM »
Hi dyang,

You're probably flagged because your on a google amp.site as image, but I am not sure about that.

Some remarks on the code your run on that page and some glitches there flagged:
error 3rd party cold reconnaissance tested vulnerable uri: -https://www.vova.com/faqs.html?service=1
error
Quote
(script) -image.vova.com/webres/vova/webresource/4dcde543544bc3ecef78bf247cae5a32/public/a/js/main.js?eb94dfeb
     status: (referer=-www.vova.com/faqs.html?service=1)saved 268918 bytes 255c4412dbc3c4d4033276fb9fecc7feb85b97b4
     info: [img] -image.vova.com/webres/vova/webresource/4dcde543544bc3ecef78bf247cae5a32/public/a/js/
     info: [iframe] -image.vova.com/webres/vova/webresource/4dcde543544bc3ecef78bf247cae5a32/public/a/js/
     info: [decodingLevel=0] found JavaScript
     suspicious: maxruntime exceeded 10 second
&
-www.vova.com/public/a/images/footer-accept.jpg?eb94dfeb
     info: [decodingLevel=0] found JavaScript
     error: undefined variable f
pervasive criteo tracking detected, but that is ad-tracking and not malicious per se.

Security 1 error detected: -https://www.vova.com
'jQuery@1.11.3' has 1 known vulnerability (1 medium). See 'https://snyk.io/vuln/npm:jquery' for more information.
No vulnerable libraries found on the image when scanned with Erlend Oftedal's scanner: https://retire.insecurity.today/#!/scan/a6fdbd952cfe8c2cdffd06ca0debb848219ecd952582f72915db2d7ad9c391bc

Wait for an avast team member to give a final verdict on your site. Avast Team Members are the only ones to unblock,
we are just volunteers with relevant knowledge.

polonus (volunteer website security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline dyang

  • Newbie
  • *
  • Posts: 5
Re: Website reported as blocked for URL:Mal, report false infection?
« Reply #79 on: September 12, 2018, 09:35:16 AM »
Hi dyang,

You're probably flagged because your on a google amp.site as image, but I am not sure about that.

Some remarks on the code your run on that page and some glitches there flagged:
error 3rd party cold reconnaissance tested vulnerable uri: -https://www.vova.com/faqs.html?service=1
error
Quote
(script) -image.vova.com/webres/vova/webresource/4dcde543544bc3ecef78bf247cae5a32/public/a/js/main.js?eb94dfeb
     status: (referer=-www.vova.com/faqs.html?service=1)saved 268918 bytes 255c4412dbc3c4d4033276fb9fecc7feb85b97b4
     info: [img] -image.vova.com/webres/vova/webresource/4dcde543544bc3ecef78bf247cae5a32/public/a/js/
     info: [iframe] -image.vova.com/webres/vova/webresource/4dcde543544bc3ecef78bf247cae5a32/public/a/js/
     info: [decodingLevel=0] found JavaScript
     suspicious: maxruntime exceeded 10 second
&
-www.vova.com/public/a/images/footer-accept.jpg?eb94dfeb
     info: [decodingLevel=0] found JavaScript
     error: undefined variable f
pervasive criteo tracking detected, but that is ad-tracking and not malicious per se.

Security 1 error detected: -https://www.vova.com
'jQuery@1.11.3' has 1 known vulnerability (1 medium). See 'https://snyk.io/vuln/npm:jquery' for more information.
No vulnerable libraries found on the image when scanned with Erlend Oftedal's scanner: https://retire.insecurity.today/#!/scan/a6fdbd952cfe8c2cdffd06ca0debb848219ecd952582f72915db2d7ad9c391bc

Wait for an avast team member to give a final verdict on your site. Avast Team Members are the only ones to unblock,
we are just volunteers with relevant knowledge.

polonus (volunteer website security analyst and website error-hunter)
Hi polonus,

Thank you for your reply!

If possible, could you please tell me how you can scan our website to find the problem?

Thanks again!

Offline HonzaZ

  • Avast team
  • Advanced Poster
  • *
  • Posts: 1130
Re: Website reported as blocked for URL:Mal, report false infection?
« Reply #80 on: September 12, 2018, 10:09:50 AM »
Hi, vova[.]com was unblocked yesterday, 09:25 CEST.

Offline dyang

  • Newbie
  • *
  • Posts: 5
Re: Website reported as blocked for URL:Mal, report false infection?
« Reply #81 on: September 12, 2018, 10:52:43 AM »
Hi, vova[.]com was unblocked yesterday, 09:25 CEST.
Hi HonzaZ,

Thank you very much!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 32449
  • malware fighter
Re: Website reported as blocked for URL:Mal, report false infection?
« Reply #82 on: September 12, 2018, 11:56:47 PM »
Hi dyang,

Anyone can do it, when you're careful enough to make the right combinations and deductions.

My website scanning is performed through normal third party cold reconnaissance public website scanners online.
I never actually visit the website to be evaluated.

Recently I use sonarwahl or now known as webhint where I use: https://snyk.io/vuln/npm:jquery to verify
retirable jQuery libraries, another is Redleg\'s file viewer for the code checks and Google alerts.
Also checked retirable jQuery from Erlend Oftedal's scanner - retire.insecurity.today/#
But I also make use of other scanners as seem appropriate.

The script errors that are found, come from a javascript unpacker service run on any particular uri or piece of javascript code.
Going beyond expected runtime is a give away of suspicion and so are scripting errors, I check them at Stack-Overflows.
This is helpful for developers where they missed something while dealing with the scriptcode (undefined this or undefined that etc.).

Another thing that counts is me doing this for 14 years here in the Virus and Worms now, to be short it is called "experience".

Important is that webmasters, hosters, web-developers, etc. learn to code with security at heart,
update and patch en configure according to best practices.

To bring this nearer in practice is also part of my motivation and constant "preaching to the choir".

Also I like avast av and like to give them a helping hand from time to time.
I owe them this platform as a place to post at least and all I learnt here with the help of colleagues.

polonus (3rd party cold reconnaissance website security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline xacajeh352

  • Newbie
  • *
  • Posts: 1
Re: Website reported as blocked for URL:Mal, report false infection?
« Reply #83 on: February 09, 2020, 05:54:27 AM »
I have the same problem, when I access the my site:
https://beautyloungelk.com/
 :-[https://beautyloungelk.com/

Offline Asyn

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 64752
    • >>>  Avast Forum - Deutschsprachiger Bereich  <<<
Win 8.1 [x64] - Avast PremSec 20.4.2410.B#5 [UI.520] - CC 5.65 - EEK - FF ESR 68.8 [NS/AOS/uBO/PB] - TB 68.8.1 - ASB/ACP/ASL.BC
Deutschsprachiger Bereich -> Avast Wissenswertes (Downloads, Anleitungen & Infos): https://forum.avast.com/index.php?topic=60523.0

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 32449
  • malware fighter
Re: Website reported as blocked for URL:Mal, report false infection?
« Reply #85 on: February 09, 2020, 03:35:58 PM »
Reputation Check
PASSED
Google Safe Browse:OK
Spamhaus Check:OK
Abuse CC:OK
Dshield Blocklist:OK
Cisco Talos Blacklist:OK
Web Server:
cloudflare
X-Powered-By:
PHP/7.3.11 Outdated Software Detected
7.5
CVE-2019-11049
In PHP versions 7.3.x below 7.3.13 and 7.4.0 on Windows, when supplying custom headers to mail() function, due to mistake introduced in commit 78f4b4a2dcf92ddbccea1bb95f8390a18ac3342e, if the header is supplied in lowercase, this can result in double-freeing certain memory locations.
7.5
CVE-2019-11047
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
6.4
CVE-2019-11050
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
6.4
CVE-2019-11044
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
5
CVE-2019-11046
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.
5
CVE-2019-19246
Oniguruma through 6.9.3, as used in PHP 7.3.x and other products, has a heap-based buffer over-read in str_lower_case_match in regexec.c.
5
CVE-2019-11045
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
4.3
IP Address:
104.31.91.246
Hosting Provider:
Cloudflare.
Shared Hosting:
500 sites found on 104.31.91.246

Configuration OK - external links Google Safebrowsing approved.

Javascript errors related to script blocker action
Quote
ReferenceError: jQuery is not defined
 /:1194

ReferenceError: jQuery is not defined
 /wp-content/plugins/elementor/assets/js/frontend-modules.min.js?ver=2.8.5:2

TypeError: a.extend is not a function
 /wp-content/plugins/elementor/assets/lib/dialog/dialog.min.js?ver=4.7.3:3

TypeError: Cannot read property 'each' of undefined
 /wp-content/plugins/elementor/assets/lib/waypoints/waypoints.min.js?ver=4.0.2:1

ReferenceError: elementorModules is not defined
 /wp-content/plugins/elementor/assets/js/frontend.min.js?ver=2.8.5:2

Also consider: https://webcookies.org/cookies/beautyloungelk.com/28957248?678928
Privacy Impact Score = D -> The page loads 39 third-party JavaScript files and 37 CSS but does not employ Sub-Resource Integrity to prevent breach if a third-party CDN is compromised

Wait for a final verdict from an avast team member as they are the only ones to come and unblock.
As we here are just volunteers with relative knowledge in the field of website security and website error-hunting.

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline jefferson sant

  • Starting Graphoman
  • *
  • Posts: 6776
  • volunteer
Re: Website reported as blocked for URL:Mal, report false infection?
« Reply #86 on: February 13, 2020, 03:33:49 AM »
I have the same problem, when I access the my site:
hxxps://beautyloungelk.com/
 :-[ hxxpsbeautyloungelk.com/hxxps://beautyloungelk.com/

Detection was removed in 11.02.2020

Quote from: Avast
Our virus specialists have been working on this problem and it has now been resolved. The provided website isn't detected by Avast anymore.
« Last Edit: February 14, 2020, 02:41:15 AM by jefferson sant »

Offline geigev

  • Newbie
  • *
  • Posts: 4
Re: Website reported as blocked for URL:Mal, report false infection?
« Reply #87 on: February 18, 2020, 04:59:07 AM »
Hello,

My site https://streamyard.com has been incorrectly flagged for phishing. The same thing has happened twice in the past and avast/avg removed the warning and said it was a false positive. Please help.

https://sitecheck.sucuri.net/results/streamyard.com

Offline Asyn

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 64752
    • >>>  Avast Forum - Deutschsprachiger Bereich  <<<
Re: Website reported as blocked for URL:Mal, report false infection?
« Reply #88 on: February 18, 2020, 05:05:29 AM »
You can report a suspected FP (File/Website) here: https://www.avast.com/false-positive-file-form.php
Win 8.1 [x64] - Avast PremSec 20.4.2410.B#5 [UI.520] - CC 5.65 - EEK - FF ESR 68.8 [NS/AOS/uBO/PB] - TB 68.8.1 - ASB/ACP/ASL.BC
Deutschsprachiger Bereich -> Avast Wissenswertes (Downloads, Anleitungen & Infos): https://forum.avast.com/index.php?topic=60523.0

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 32449
  • malware fighter
Re: Website reported as blocked for URL:Mal, report false infection?
« Reply #89 on: February 19, 2020, 05:31:30 PM »
Probably flagged for a hidden iFrame, see code line 65 here:
https://aw-snap.info/file-viewer/?protocol=secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=c3R9e3xteXx9Iy5eXW1g~enc
Web Firewall blocks -https://www.googletagmanager.com/ns.html?id=GTM-5KG4PZD  as "Ads".
Quote
<iframe src="htxps://www.googletagmanager.com/ns.html?id=GTM-5KG4PZD" height="0" width="0" style="display:none;visibility:hidden"></iframe>

Not being flagged at VT here: https://www.virustotal.com/gui/ip-address/35.227.212.162/relations

Wait for an avast team member to give a final verdict as they are the only ones to come and unblock.

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!