Author Topic: Outdated Word Press website with security issues.  (Read 703 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33900
  • malware fighter
Outdated Word Press website with security issues.
« on: May 19, 2020, 06:53:24 PM »
See: https://urlscan.io/result/ec6feabd-72d3-40a1-9d58-ca99e8937ed8/

Outdated: https://sitecheck.sucuri.net/results/www.showhauler.com

Code outside html tag is considered suspicious: https://aw-snap.info/file-viewer/?protocol=not-secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=d3d3LnNoXXdofHVse30uXl1tYA%3D%3D~enc

Where hosted?: https://www.shodan.io/host/158.69.254.117

Website is insecure by default
100% of the trackers on this site could be protecting you from NSA snooping. Tell -showhauler.com to fix it.

Identifiers | All Trackers
 Insecure Identifiers
Unique IDs about your web browsing habits have been insecurely sent to third parties.

204=ya9qytg7phn4nmeXXXXXXXXXXXXXXXXijpoh0sg26qowdy33xrh8sxwoaipu_jsysdknfdkhekg7pxyujlkcudltdhdmyzddixhykebsinsz9gdi1mchur1zeuwsiv_nb-inxfcjl8wcfcvl8cv6jg1axnxfgd97jkgp-7ab18 maps.google dot comnid

 Tracking IDs could be sent safely if this site was secure.

Retirable jQuery libraries detected with retire.js: Retire.js
jquery   1.12.4   Found in -http://www.showhauler.com/blog/wp-includes/js/jquery/jquery.js?ver=1.12.4<br>Vulnerability info:
Medium   2432 3rd party CORS request may execute CVE-2015-9251   
Medium   CVE-2015-9251 11974 parseHTML() executes scripts in event handlers   
Low   CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution   123
Medium   Regex in its jQuery.htmlPrefilter sometimes may introduce XSS

But general code not found to be vulnerable:
Apache, headers
Not vulnerable
jQuery, script
Not vulnerable
jQuery Migrate, script
Not vulnerable
jQuery, headers - 1.12.4
Not vulnerable
Font Awesome, html
Not vulnerable
Yoast SEO, html - 9.2.1
Not vulnerable

polonus (volunteer 3rd party cold recon website security-analyst and website error-hunter)

Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!