Author Topic: Bigger website on CloudFlare with outdated CMS - malware downloads  (Read 1555 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33903
  • malware fighter
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline Asyn

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 76037
    • >>>  Avast Forum - Deutschsprachiger Bereich  <<<
W8.1 [x64] - Avast Free AV 23.3.8047.BC [UI.757] - Firefox ESR 102.9 [NS/uBO/PB] - Thunderbird 102.9.1
Avast-Tools: Secure Browser 109.0 - Cleanup 23.1 - SecureLine 5.18 - DriverUpdater 23.1 - CCleaner 6.01
Avast Wissenswertes (Downloads, Anleitungen & Infos): https://forum.avast.com/index.php?topic=60523.0

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33903
  • malware fighter
Re: Bigger website on CloudFlare with outdated CMS - malware downloads
« Reply #2 on: April 12, 2022, 10:14:04 PM »
Sometimes a website need not be malicious per se, but could hold quite some particular vulnerabilities,
that easily could be exploited.
Or another website is performing unethical third party tracking, that will be blocked by adblockers but is not flagged by av.

Look at this random example. Visiting this site: hxtps://www.aizhan.com/ I immedeately get a Punkspider extension alert for 11 XSS vulnerabilities on that particular website. Confirmed here by retire.js:
Quote
jquery   1.9.1.min   Found in -https://statics.aizhan.com/js/jquery-1.9.1.min.js _____Vulnerability info:
Medium   2432 3rd party CORS request may execute CVE-2015-9251   
Medium   CVE-2015-9251 11974 parseHTML() executes scripts in event handlers   
Medium   CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution   123
Medium   CVE-2020-11022 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS   
Medium   CVE-2020-11023 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS

Additionally this should be blocked as a redirect to -https://cpro.baidu.com/cpro/ui/uijs.php
where uMatrix will block it instantly, but we will get no av-vendor alerts for it.
Re: https://www.virustotal.com/gui/url/94d4ba3cd9d2f946ef4760ac68fb4025128dbcbd018e6e97f11dfe74d95b3a32?nocache=1

The website infrastructure could often be defined as being a swamp,
and you never could know where the malware alligator will strike next.

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!