Avast is flagging several (but not all) JPG files as phishing. Website is hxtps://mybookcave.com. Seems to have started this morning. Why are those files flagged as phishing? They are book covers, nothing there that could make someone divulge confidential information. How do I get my website delisted?
→ https://sitecheck.sucuri.net/results/https/mybookcave.com
→ https://www.virustotal.com/gui/url/6758cbe2b61133bfc04597f20906c525eebac187172eec7ce40ae04a179ec49d/detection
You can report a suspected FP (File/Website) here: https://www.avast.com/false-positive-file-form.php
CMS configuration issues: User Enumeration
The first two user ID’s were tested to determine if user enumeration is possible.
ID User Login
1 0x0049 jordan
2 Rachel Ann Nunes rachel
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.
Recommendations to improve website and website security, found through linting:
https://webhint.io/scanner/103802ac-5a0f-4b62-996d-168c5b4abf05
Wait for a final verdict of an avast team member as they are the only ones to come and unblock,
we are just volunteers with relative knowledge of 3rd party cold recon website security analysis and error-hunting.
See
Detected jQuery libraries to be retired:
jquery 1.11.1 Found in https://ajax.googleapis.com/ajax/libs/jquery/1.11.1/jquery.min.js
Vulnerability info:
Medium 2432 3rd party CORS request may execute CVE-2015-9251
Medium CVE-2015-9251 11974 parseHTML() executes scripts in event handlers
Low CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, …) because of Object.prototype pollution
I do not see the website being blocked by avast’s at the moment.
polonus (volunteer 3rd party cold recon website security analyzer and website error-hunter)
Thank you for those links. And for pointing out the user enumeration issue–I was not aware that this was even possible. I’ll be working on these as time permits.
Hello, my website is also having this same issue of muy clean site getting flagged all over the place for phishing by avast web shield. I have run multiple malware checks and wordfence cleanups and all looks ok.
The site is haciendaeltriangulo.com
Any suggestions? thank you.
First of all modify the link so it isn’t active (as I have in the quoted text) to avoid accidental exposure to a suspect site.
I don’t see anything about jpg files as the detection is on the domain, see attached image.
Avast Isn’t alone in detecting your site:
https://www.virustotal.com/gui/url/3a2a0cd8465de39c5fb6aea91b03a9a0d250acab6aeeef5d02f53498d056491a?nocache=1
Security issues reported here - https://en.internet.nl/site/haciendaeltriangulo.com/1826062/
Further issues - Webpage Security Score F
https://snyk.io/test/website-scanner/?test=221216_BiDcWT_DE&utm_medium=referral&utm_source=webpagetest&utm_campaign=website-scanner
Woah! Was not expecting all of that. Thanks for the help, I’ll start trying to fix all of those issues one by one
You’re welcome.
When you have some progress you can use this:
Reporting a Possible False Positive File or Website - https://www.avast.com/false-positive-file-form.php.
You should get a response in a day or two.
As and Avast user, I can only point you in the right direction, to remove it only the Avast virus labs team can do that.
Still flagged by avast’s,
A word press security scan fails (time-out to target wp-includes), also see: https://sitecheck.sucuri.net/results/haciendaeltriangulo.com
Then there is this info on the IP address:
https://www.malwareurl.com/ns_listing.php?ip=51.254.238.160
Flu & Qack-bot infested, and with scam & spam abuse.
polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)