Author Topic: Open anynomous proxy detected, website vulnerable...  (Read 1873 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33927
  • malware fighter
Open anynomous proxy detected, website vulnerable...
« on: November 20, 2015, 05:36:24 PM »
See IP: http://www.liveipmap.com/199.116.252.187
The following plugins were detected by reading the HTML source of the WordPress sites front page.

google-analyticator 6.4.9.6   latest release (6.4.9.6)
http://www.videousermanuals.com/google-analyticator/ Up to date...
The theme has been found by examining the path /wp-content/themes/ *theme name* /

 Canvas 5.1.3http://www.woothemes.com/

Warning Directory Indexing Enabled
In the test we attempted to list the directory contents of the uploads and plugins folders to determine if Directory Indexing is enabled. This is an information leakage vulnerability that can reveal sensitive information regarding your site configuration or content.

/wp-content/uploads/ enabled

PHP Version: 5.3.29 (Outdated)

Detected libraries:
jquery-migrate - 1.2.1 : -http://tuchambelan.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery - 1.11.3 : (active1)-http://tuchambelan.com/wp-includes/js/jquery/jquery.js?ver=1.11.3
(active) - the library was also found to be active by running code
1 vulnerable library detected

Landing at:  URL: -http://gethealthynow.biz/ Possibly a PHISH: http://scanurl.net/?u=gethealthynow.biz
Website grader tool score: http://ninjaemails.com/website-grader/site/gethealthynow.biz

polonus
« Last Edit: November 20, 2015, 05:40:31 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33927
  • malware fighter
Re: Open anynomous proxy detected, website vulnerable...
« Reply #1 on: November 20, 2015, 05:49:07 PM »
About the outdated PHP version and CMS. CMS will continue to support PHP 5.3 for as long as it's possible. This means that they'll drop PHP only if this is a requirement to supporting a future version of PHP or when they can no longer run PHP 5.3 on their test servers.

Just as there should not be excessive header info spread even when older versions given while updated, upgraded and with all patches enabled. What is reported are misconfiguration issues, info that could pose an eventual threat in the hands of so-called script kiddies.

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!