Avast community forum
Home
Help
Search
Login
Register
Avast WEBforum
»
Other
»
Viruses and worms
(Moderators:
Maxx_original
,
misak
) »
An exploit kit drop here?
« previous
next »
Print
Pages: [
1
]
Go Down
Author
Topic: An exploit kit drop here? (Read 1706 times)
0 Members and 1 Guest are viewing this topic.
polonus
Avast Überevangelist
Probably Bot
Posts: 34054
malware fighter
An exploit kit drop here?
«
on:
March 06, 2016, 10:46:12 PM »
See:
https://www.virustotal.com/en/url/f1c9b2b0f31bfb0bead1d70bb88d3d2f5375881cadea3126817a636121796c4d/analysis/1457299544/
Quttera Labs - domain is Malicious.
"The malware entry is cached and may not reflect the current status of the domain".
Consider: -/ka/216/%E1%83%97%E1%83%90%E1%83%95%E1%83%AF%E1%83%93%E1%83%9D%E1%83%9B%E1%83%90%E1%83%A0%E1%83%94
Link with outdated software: -http://edu.gba.ge/events-2/%E1%83%A2%E1%83%A0%E1%83%94%E1%83%9C%E1%83%98%E1%83%9C%E1%83%92%E1%83%98/
See:
http://www.domxssscanner.com/scan?url=http%3A%2F%2Fgba.ge%2Fka%2Fgallery%2F
Blacklisted link: -http://edu.gba.ge/events-2/%e1%83%a2%e1%83%a0%e1%83%94%e1%83%9c%e1%83%98%e1%83%9c%e1%83%92%e1%83%98/ ->
http://www.domxssscanner.com/scan?url=http%3A%2F%2Fedu.gba.ge%2Fevents-2%2F%25e1%2583%25a2%25e1%2583%25a0%25e1%2583%2594%25e1%2583%259c%25e1%2583%2598%25e1%2583%259c%25e1%2583%2592%25e1%2583%2598%2F
Detected libraries:
jquery - 1.8.3 : (active1) -http://gba.ge/skins/default/js/jquery.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery-ui-dialog - 1.9.2 : (active1) -http://gba.ge/skins/default/js/ui.js
Info: Severity: medium
http://bugs.jqueryui.com/ticket/6016
jquery-ui-autocomplete - 1.9.2 : (active1) -http://gba.ge/skins/default/js/ui.js
jquery-ui-tooltip - 1.9.2 : (active1) -http://gba.ge/skins/default/js/ui.js
Info: Severity: high
http://bugs.jqueryui.com/ticket/8859
(active) - the library was also found to be active by running code
3 vulnerable libraries detected
HTTP Server: Apache HTTP Server
PHP Version: 5.2.17 (Outdated)
Instant Cloud server:
http://toolbar.netcraft.com/site_report/?url=www.gba.ge%2F
-> poor community ratings:
https://www.mywot.com/en/scorecard/proservice.ge?utm_source=addon&utm_content=rw-viewsc
Stealth and missing Name Servers:
http://www.dnsinspect.com/gba.ge/1457300456
polonus
«
Last Edit: March 06, 2016, 10:50:28 PM by polonus
»
Logged
Cybersecurity is more of an attitude than anything else. Avast Evangelists.
Use NoScript, a limited user account and a virtual machine and be safe(r)!
polonus
Avast Überevangelist
Probably Bot
Posts: 34054
malware fighter
Re: An exploit kit drop here?
«
Reply #1 on:
March 06, 2016, 10:56:59 PM »
At the root of all this is the WordPress insecurity at this website, let's have a look:
WordPress Version
2.22
Version does not appear to be latest 4.4.2 - update now.
WordPress Plugins
The following plugins were detected by reading the HTML source of the WordPress sites front page.
revslider
g1-social-icons
simple-social-share 1.0 latest release (3.0) Update required
http://perials.com
g1-gmaps
eventON
contact-form-7 4.1.1 latest release (4.4) Update required
http://contactform7.com/
Plugins are a source of many security vulnerabilities within WordPress installations, always keep them updated to the latest version available and check the developers plugin page for information about security related updates and fixes.
Warning User Enumeration is possible
The first two user ID's were tested to determine if user enumeration is possible.
ID User Login
1 edu. gba cache
2 None tiko
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.
Compromised sites will often contain embedded iframes that can also deliver malicious code to visitors of the web site. Check any discovered iframes and ensure they are legitimate.
-//www.facebook.com/plugins/likebox.php?href=https%3A%2F%2Fwww.facebook.com%2FGBAtrainingcenter&width=965&height=258&colorscheme=light&show_faces=true&header=false&stream=false&show_border=false&appId=275291799245613 seems OK here.
XSS Dom issues for this link:
http://www.domxssscanner.com/scan?url=http%3A%2F%2Fwww.facebook.com%2Fplugins%2Flikebox.php%3Fhref%3Dhttps%253A%252F%252Fwww.facebook.com%252FGBAtrainingcenter%26width%3D965%26height%3D258%26colorscheme%3Dlight%26show_faces%3Dtrue%26header%3Dfalse%26stream%3Dfalse%26show_border%3Dfalse%26appId%3D275291799245613
landing at: -Results from scanning URL:
https://static.xx.fbcdn.net/rsrc.php/v2/yq/r/0wM5s1Khldu.js
Number of sources found: 66
Number of sinks found: 20
This here seems 100 % OK - A-Status all = same origin:
https://sritest.io/#report/58993912-57ac-402d-ad89-a709874ff27d
polonus (volunteer website security analyst and website error-hunter)
Logged
Cybersecurity is more of an attitude than anything else. Avast Evangelists.
Use NoScript, a limited user account and a virtual machine and be safe(r)!
polonus
Avast Überevangelist
Probably Bot
Posts: 34054
malware fighter
Re: An exploit kit drop here?
«
Reply #2 on:
March 06, 2016, 11:28:59 PM »
Seems VT does not have any threat detection listed. The vulnerability of the site remains however.
polonus
Logged
Cybersecurity is more of an attitude than anything else. Avast Evangelists.
Use NoScript, a limited user account and a virtual machine and be safe(r)!
Print
Pages: [
1
]
Go Up
« previous
next »
Avast WEBforum
»
Other
»
Viruses and worms
(Moderators:
Maxx_original
,
misak
) »
An exploit kit drop here?