Author Topic: false positive - [solved]  (Read 1327 times)

0 Members and 1 Guest are viewing this topic.

Offline francisco129

  • Newbie
  • *
  • Posts: 8
« Last Edit: July 27, 2024, 06:41:02 PM by francisco129 »

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34029
  • malware fighter
Re: false positive
« Reply #1 on: July 24, 2024, 11:46:45 PM »
Suspicious links were found:

What about hxtps://region1.google-analytics.com/g/collect?v=2? &tid=G-T915SD7BNP%3Em=45je47o0v9119105494za200&_p=1721857051493&gcd=13l3l3l2l1&npa=1&dma_cps=syphamo&dma=1&tag_exp=0&cid=1402193343.1721857052&ul=en-us&sr=800x600&frm=0&pscdl=noapi&_s=1&sid=1721857051&sct=1&seg=0&dl=https%3A%2F%2Fdte.twp.cl%2F&dt=XML%20a%20PDF%20-%20Archivos%20DTE%20del%20SII%20Chile&en=page_view&_fv=1&_nsi=1&_ss=1&_ee=1&tfd=1401  It could be a legit Google tracker

blocked https://www.clarity.ms/s/0.7.41/clarity.js because of clarity dot ms. uMatrix blocks for me.

This script: htxps://dte.twp.cl/polyfills-LZBJRJJE.js  Third-party script injection: Although the script is hosted on a trusted CDN, there's still a risk of malicious actors injecting malicious code into the polyfill script. This could happen if an attacker compromises the CDN or uses a vulnerable version of the script.
Execution context: Since the script is intended to be executed in a web page context, there's a risk of it being used to exploit vulnerabilities in the hosting page or other scripts.
Bypassing browser restrictions: Some polyfills may potentially bypass browser restrictions or security features, such as the Content Security Policy (CSP) or Same-Origin Policy. However, in this case, the script appears to be designed for browser compatibility and doesn't seem to intentionally bypass security controls.

But again, as said many times before, wait for a final verdict by avast's

polonus
« Last Edit: July 24, 2024, 11:59:15 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37697
  • F-Secure user
Re: false positive
« Reply #2 on: July 24, 2024, 11:58:24 PM »
Quote
I would like to know the reason for correcting and leaving the list, I have sent all the information to the form https://www.avast.com/report-false-positive#pc but I cannot get it removed from the list black.
When did you report it, today?


Offline francisco129

  • Newbie
  • *
  • Posts: 8
Re: false positive
« Reply #3 on: July 25, 2024, 01:23:51 AM »
I thank you very much for responding.

1. regarding google tracker, this is what google analytics tells me to add to the website

2. regarding clarity. It is the Microsoft script, it is totally legitimate, I am attaching a screenshot of that.

3. Regarding polyfills, I am going to review how I can replace it from Angular. (I am not using cdn, it is from the same server when packaging the app.)

Again, thank you for responding with that security analysis!



Suspicious links were found:

What about hxtps://region1.google-analytics.com/g/collect?v=2? &tid=G-T915SD7BNP%3Em=45je47o0v9119105494za200&_p=1721857051493&gcd=13l3l3l2l1&npa=1&dma_cps=syphamo&dma=1&tag_exp=0&cid=1402193343.1721857052&ul=en-us&sr=800x600&frm=0&pscdl=noapi&_s=1&sid=1721857051&sct=1&seg=0&dl=https%3A%2F%2Fdte.twp.cl%2F&dt=XML%20a%20PDF%20-%20Archivos%20DTE%20del%20SII%20Chile&en=page_view&_fv=1&_nsi=1&_ss=1&_ee=1&tfd=1401  It could be a legit Google tracker

blocked https://www.clarity.ms/s/0.7.41/clarity.js because of clarity dot ms. uMatrix blocks for me.

This script: htxps://dte.twp.cl/polyfills-LZBJRJJE.js  Third-party script injection: Although the script is hosted on a trusted CDN, there's still a risk of malicious actors injecting malicious code into the polyfill script. This could happen if an attacker compromises the CDN or uses a vulnerable version of the script.
Execution context: Since the script is intended to be executed in a web page context, there's a risk of it being used to exploit vulnerabilities in the hosting page or other scripts.
Bypassing browser restrictions: Some polyfills may potentially bypass browser restrictions or security features, such as the Content Security Policy (CSP) or Same-Origin Policy. However, in this case, the script appears to be designed for browser compatibility and doesn't seem to intentionally bypass security controls.

But again, as said many times before, wait for a final verdict by avast's

polonus

Offline francisco129

  • Newbie
  • *
  • Posts: 8
Re: false positive
« Reply #4 on: July 25, 2024, 01:26:21 AM »
In the last week, *It's been 9 days since the first report I made.

It is quite frustrating, because they could give you a tracking number, to have evidence of the shipments that have been made to the form.


Quote
I would like to know the reason for correcting and leaving the list, I have sent all the information to the form https://www.avast.com/report-false-positive#pc but I cannot get it removed from the list black.
When did you report it, today?
« Last Edit: July 25, 2024, 01:30:36 AM by francisco129 »

Offline francisco129

  • Newbie
  • *
  • Posts: 8
Re: false positive
« Reply #5 on: July 25, 2024, 05:40:34 PM »
I have continued checking with other tools and they do not detect a problem.

https://radar.cloudflare.com/scan/c214fd90-0693-4c0e-ad9f-e0af18102fec/security
https://safeweb.norton.com/report?url=https:%2F%2Fdte.twp.cl

I'm worried because I do this and my clients are affected.

Offline francisco129

  • Newbie
  • *
  • Posts: 8
Re: false positive
« Reply #6 on: July 25, 2024, 08:48:38 PM »
Many thanks to the Avast team who removed us from the blacklist!

Offline DavidR

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 89611
  • No support PMs thanks
Re: false positive [solved]
« Reply #7 on: July 25, 2024, 09:42:44 PM »
Many thanks to the Avast team who removed us from the blacklist!

Thanks for the confirmation.
Windows 10 Home 64bit/ Acer Aspire F15/ Intel Core i5 7200U 2.5GHz, 8GB DDR4 memory, 256GB SSD, 1TB HDD/ avast! free  24.8.6127 (build 24.8.9372.862) UI 1.0.814/ Firefox, uBlock Origin, uMatrix/ MailWasher Pro/ Avast! Mobile Security

Offline francisco129

  • Newbie
  • *
  • Posts: 8
Re: false positive [reopen]
« Reply #8 on: July 27, 2024, 01:11:26 AM »
Yesterday they deleted my site and today it appears again, blocked, please help.
Again the false positive form.

Please help me understand what is happening.

https://dte.twp.cl

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34029
  • malware fighter
Re: false positive - [reopen]
« Reply #9 on: July 27, 2024, 12:35:58 PM »
With VT, there is only the CRDF Threat Centre that flags; Isitphish gives 90.9% legitimacy and 9.1% phishing.

Here it is getting all green: https://quttera.com/detailed_report/dte.twp.cl

Polyfill Script: Regarding the polyfill script from htxps://dte.twp.cl/polyfills-LZBJRJJE.js, it's crucial to verify its source.
As with any script, there's a risk if the CDN is compromised or if a vulnerable version is being used.
If you have control over the CDN or the script, make sure it’s up-to-date and verify its integrity.

Again, wait for a final verdict from the Avast team.

polonus
« Last Edit: July 27, 2024, 12:39:33 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline francisco129

  • Newbie
  • *
  • Posts: 8
Re: false positive - [solved]
« Reply #10 on: July 27, 2024, 06:40:05 PM »
Thanks for replying again.

You are indeed right, my deployment process does not delete that file, that is why it kept appearing.

I updated the versions of zone.js and angular (due to the polyfills bug)
and the URL of the previous version of htxps://dte.twp.cl/polyfills-LZBJRJJE.js is no longer there.

I sent the false positive request to https://threatcenter.crdf.fr/false_positive.html
and the problem no longer appears.


I see that it has been fixed in Avast and in CRDF.

https://www.virustotal.com/gui/url/e587c57a6cbcaf6fbcdc047f5a73a94ad67c31e3b532a65518452107f60630e9?nocache=1
https://www.urlvoid.com/scan/dte.twp.cl/

Thanks a lot bro.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34029
  • malware fighter
Re: false positive - [solved]
« Reply #11 on: July 27, 2024, 07:34:28 PM »
Hi francisco129,

You are welcome, good that this is out of the way now.
As they say, all is well that ends well.

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!