See: https://www.virustotal.com/nl/url/3031d5a715775ed46ae1f290140eadac36bce6704f15c08886ed310ca7927a65/analysis/1437863242/
Nothing: http://quttera.com/detailed_report/redes-loyola.blogspot.com
Infested? → -https://www.blogger.com/static/v1/jsbin/1333113279-ieretrofit.js
See part of HTTP requests for https://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~VB-FWB/detailed-analysis.aspx
Blocked request by uMatrix for: -http://gg.google.com/*
Security header info for gg.google.com site:
Strict-Transport-Security
Uh oh! Strict-Transport-Security does not appear to be found in the site’s HTTP header, so browsers will not try to access your pages over SSL firstContent Security Policy
Uh oh! We did not detect Content-Security-Policy , x-webkit-csp, or even x-webkit-csp-report-only in the site’s HTTP header, making XSS attacks more likely to succeed.
.Server Information
Uh oh! Server: was found in this site’s HTTP header, possibly making it easier for attackers to know about potential vulnerabilities that may exist on your site!
Cross Domain Meta Policy
Uh oh! Permitted-Cross-Domain-Policies does not appear to be found in the site’s HTTP header, so it’s possible that cross domain policies can be set by other users on your site and be obeyed by Adobe Flash and pdf files…
pol
Update of persistent issues with ieretrofit.js → example scan: http://www.domxssscanner.com/scan?url=https%3A%2F%2Fwww.blogger.com%2Fstatic%2Fv1%2Fjsbin%2F1333113279-ieretrofit.js
Consider my posting here: https://forum.avast.com/index.php?topic=155632.0
From https://www.blogger.com/static/v1/widgets/329677814-widgets.js →
<!DOCTYPE html><html><head><link rel="stylesheet" href="https://www.gstatic.com/_/hr/_/ss/k=homeroom.homeroom_share_widget.-44m7dvj81p6i.L.X.O/m=share_widget/d=1/rs=AK3ymSXg82Jb33pWwWJzud2Oc1IoMJ7d9g"></head><body><div class="hrIdWidgetContainer"></div><script type="text/javascript">var _hrHost_ = "https:\/\/classroom.google.com"; var _F_jsUrl = "https:\/\/www.gstatic.com\/_\/hr\/_\/js\/k\x3dhomeroom.homeroom_share_widget.en_US.bLesL0LBndk.O\/m\x3dshare_widget\/rt\x3dj\/d\x3d1\/rs\x3dAK3ymSWrY-ITpchTUeXEkTkD37_58MDCyA";</script><script id="base-js" src="https://www.gstatic.com/_/hr/_/js/k=homeroom.homeroom_share_widget.en_US.bLesL0LBndk.O/m=share_widget/rt=j/d=1/rs=AK3ymSWrY-ITpchTUeXEkTkD37_58MDCyA"></script></body></html>
→ “-https://www.gstatic.com/classroom/sharewidget/widget_stable.html?usegapi \u003d1”},“ytshare”
→ “-https://ssl.gstatic.com/microscope/embed/"},"savetowallet ”:
→ -//csi.gstatic.com/csi",Od=“//www.blogger.com/img/widgets/icon_contactform_cross.gif”,Pd="/rearrange ?
→ “-http://csi.gstatic.com/csi",ej="-http://search.yahoo.com/mrss/ ”,fj=
“https”,gj=“https:”,hj=“https://csi.gstatic.com/csi",ij="-https://m.facebook.com/sharer.php?u= ”
→ -https://www.gstatic.com/classroom/sharewidget/widget_stable.html?usegapi \u003d1"
→ -https://csi.gstatic.com/csi",ij=" https://m.facebook.com/sharer.php?u=
And more interesting where we wind up from here: http://www.domxssscanner.com/scan?url=https%3A%2F%2Fwww.gstatic.com%2Fclassroom%2Fsharewidget%2Fwidget_stable.html%3Fusegapi\u003d1"}%2C"ytshare → -https://www.gstatic.com/ /hr/ /js/k=homeroom.homeroom
_share_widget.en_US.bLesL0LBndk.O/m=
share_widget/rt=j/d=1/rs=AK3ymSWrY-ITpchTUeXEkTkD37_58MDCyA
For what happens here, read: http://docs.yworks.com/yfiles/doc/developers-guide/mvc_controller.html
polonus (volunteer website security analyst and website error-hunter)
P.S. Interesting link: https://developer.linkedin.com/plugins/share
D
polonus
September 17, 2015, 4:24pm
3