Author Topic: Defacement flagged?  (Read 1167 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast √úberevangelist
  • Probably Bot
  • *****
  • Posts: 33937
  • malware fighter
Defacement flagged?
« on: August 19, 2015, 01:14:38 AM »
Sucuri has it:
ISSUE DETECTED   DEFINITION   INFECTED URL
Defacement   MW:DEFACED:01   -http://08-citycargo.se/
Defacement   MW:DEFACED:01   -http://08-citycargo.se/404javascript.js
Web site defaced. Details: http://sucuri.net/malware/entry/MW:DEFACED:01
<title>Hacked By Yunus Incredibl</title>
System Details:
Running on: nginx/1.0.14
Powered by: PHP/5.3.10
Outdated Web Server Nginx Found: nginx/1.0.14
Embed tests: http://oscarotero.com/embed/demo/index.php?url=http%3A%2F%2F08-citycargo.se&options%5BminImageWidth%5D=0&options%5BminImageHeight%5D=0&options%5BfacebookAccessToken%5D=&options%5BembedlyKey%5D=&options%5BsoundcloudClientId%5D=YOUR_CLIENT_ID&options%5BoembedParameters%5D=

See warnings here: http://oscarotero.com/embed/demo/index.php?url=http%3A%2F%2Ffacebook.com%2Fyunusdfgdfg123155&options%5BminImageWidth%5D=0&options%5BminImageHeight%5D=0&options%5BfacebookAccessToken%5D=&options%5BembedlyKey%5D=&options%5BsoundcloudClientId%5D=YOUR_CLIENT_ID&options%5BoembedParameters%5D=
while the $content there is not passing the sanitation to make it a string, code should read:
Code: [Select]
$this->parse_content( $this->content ); for
Code: [Select]
$this->parse_content( $content ); includes in php.code!
Abuse of facebook BigPipe code!

polonus (volunteer website security analyst and website error-hunter)

« Last Edit: August 19, 2015, 01:19:51 AM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!