Author Topic: Even Bitnami MEAN virtual websites may come with issues!  (Read 953 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33903
  • malware fighter
Even Bitnami MEAN virtual websites may come with issues!
« on: January 22, 2017, 12:22:26 AM »
Latest OpenSource technology built with Node.JS programming language and
further using Express, Google Font AP, Twitter Bootstrap, JQuery 1.11.1 (see retirables) software.

See what we have detected here for -http://52.23.207.142:3000/
http://52.23.207.142:3000/
Detected libraries:
jquery - 1.11.1 : (active1) -http://52.23.207.142:3000/js/jquery-1.11.1.min.js
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
(active) - the library was also found to be active by running code
1 vulnerable library detected

9 red out of 10 risk status: http://toolbar.netcraft.com/site_report?url=http://52.23.207.142

A status here: https://sritest.io/#report/27078386-a6ff-4360-9f16-c57ff9ea5ded
Re: -http://ec2-52-23-207-142.compute-1.amazonaws.com/ Ubuntu Open Source
F-I-E-X status here: https://observatory.mozilla.org/analyze.html?host=ec2-52-23-207-142.compute-1.amazonaws.com

On -http://52.23.207.142:3000/ we find:
Insecure ID-tracking: At least 4 third parties know you are on this webpage.

 -Google
 -Google
 -shaaaaaaaaaaaaa.com
-52.23.207.142  -52.23.207.142

Consider: http://www.domxssscanner.com/scan?url=http%3A%2F%2F52.23.207.142%3A3000%2Fjs%2Fjquery-1.11.1.min.js     

polonus (volunteer wesbite security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!