I went to visit the website “teamfrourstar.com”, a website of Dragon Ball Z abridged parody dubbing team. I’ve visited this site countles times before, but just now something appeared; when I went to watch one of their newest videos and was going to activate Flash player (I keep it on asking permission setting as default), but then Noscript alerted me about possible XSS-attack on the site, but after visiting the page where Noscript showed the alert, it gave me nothing. Im not sure if this is falce positive or what, could someone check it out? ??? Sucuri shows up clean, as does Virustotal.
EDIT: It seemed to happen again when I tried opening website in new browser window window. Noscpript console shows this (part of text is in finnish, but I hope you can make out some of it):
ReferenceError: googletag is not defined dbz-abridged-movie-super-android-13-teamfourstar-tfs:3902:2
TypeError: sing is undefined bal.js:931:17
[NoScript InjectionChecker] JavaScript Injection in ///u/function ()t.__noSuchMethod__(n,Array.prototype.slice.call(arguments))/se/0/_/ 1/fastbutton?usegapi=1&width=100&size=medium&origin=http://teamfourstar.com&url=http://teamfourstar.com/video/dbz-abridged-movie-super-android-13-teamfourstar-tfs/&gsrc=3p&ic=1&jsh=m;/_/scs/apps-static/_/js/k=oz.gapi.fi.SYxU0C_41cA.O/m=__features__/am=AQ/rt=j/d=1/t=zcms/rs=AGLTcCN6vod5mWx6CTilOJQAzWyzkwEqAg#_methods=onPlusOne,_ready,_close,_open,_resizeMe,_renderstart,oncircled,drefresh,erefresh,onload&id=I0_1446392001374&parent=http://teamfourstar.com&pfname=&rpctoken=10178753
(function anonymous() {
u/function ()t.__noSuchMethod__(n,Array.prototype.slice.call(arguments)) /* COMMENT_TERMINATOR */
DUMMY_EXPR
})
[NoScript XSS] Siistitty epäilyttävä pyyntö. Alkuperäinen URL [-https://apis.google.com/u/function%20()t.__noSuchMethod__(n,Array.prototype.slice.call(arguments))/se/0/_/+1/fastbutton?usegapi=1&width=100&size=medium&origin=http%3A%2F%2Fteamfourstar.com&url=http%3A%2F%2Fteamfourstar.com%2Fvideo%2Fdbz-abridged-movie-super-android-13-teamfourstar-tfs%2F&gsrc=3p&ic=1&jsh=m%3B%2F_%2Fscs%2Fapps-static%2F_%2Fjs%2Fk%3Doz.gapi.fi.SYxU0C_41cA.O%2Fm%3D__features__%2Fam%3DAQ%2Frt%3Dj%2Fd%3D1%2Ft%3Dzcms%2Frs%3DAGLTcCN6vod5mWx6CTilOJQAzWyzkwEqAg#_methods=onPlusOne%2C_ready%2C_close%2C_open%2C_resizeMe%2C_renderstart%2Concircled%2Cdrefresh%2Cerefresh%2Conload&id=I0_1446392001374&parent=http%3A%2F%2Fteamfourstar.com&pfname=&rpctoken=10178753] pyydetty kohteesta [-http://teamfourstar.com/video/dbz-abridged-movie-super-android-13-teamfourstar-tfs/]. Siistitty URL: [-https://apis.google.com/u/FUNCTION%20%20%20t.__NOSUCHMETHOD__%20n,Array.prototype.slice.call%20arguments%20%20/se/0/_/+1/fastbutton?usegapi=1&width=100&size=medium&origin=http%3A%2F%2Fteamfourstar.com&url=http%3A%2F%2Fteamfourstar.com%2Fvideo%2Fdbz-abridged-movie-super-android-13-teamfourstar-tfs%2F&gsrc=3p&ic=1&jsh=m%3B%2F_%2Fscs%2Fapps-static%2F_%2Fjs%2Fk%20oz.gapi.fi.SYxU0C_41cA.O%2Fm%20__features__%2Fam%20AQ%2Frt%20j%2Fd%201%2Ft%20zcms%2Frs%20AGLTcCN6vod5mWx6CTilOJQAzWyzkwEqAg#9956950407942605437].
TypeError: sing is undefined bal.js:931:17
about:blank : Unable to run script because scripts are blocked internally.
Sivusto käyttää SHA-1 -varmennetta. On suositeltua käyttää varmenteita, joiden allekirjoitusalgoritmit käyttävät SHA-1:ä vahvempia tiivistefunktioita.[Learn More] www.facebook.com
about:blank : Unable to run script because scripts are blocked internally.
Turvallisuusvirhe: Sisältö kohteessa -https://plus.google.com/u/FUNCTION%20%20%20t.__NOSUCHMETHOD__%20n,Array.prototype.slice.call%20arguments%20%20/se/0/_/+1/fastbutton?usegapi=1&width=100&size=medium&origin=http://teamfourstar.com&url=http://teamfourstar.com/video/dbz-abridged-movie-super-android-13-teamfourstar-tfs/&gsrc=3p&ic=1&jsh=m;/_/scs/apps-static/_/js/k+oz.gapi.fi.SYxU0C_41cA.O/m+__features__/am+AQ/rt+j/d+1/t+zcms/rs+AGLTcCN6vod5mWx6CTilOJQAzWyzkwEqAg#9956950407942605437 ei voi ladata dataa kohteesta -http://teamfourstar.com/video/dbz-abridged-movie-super-android-13-teamfourstar-tfs/.
Load denied by X-Frame-Options: -https://plus.google.com/u/FUNCTION%20%20%20t.__NOSUCHMETHOD__%20n,Array.prototype.slice.call%20arguments%20%20/se/0/_/+1/fastbutton?usegapi=1&width=100&size=medium&origin=http://teamfourstar.com&url=http://teamfourstar.com/video/dbz-abridged-movie-super-android-13-teamfourstar-tfs/&gsrc=3p&ic=1&jsh=m;/_/scs/apps-static/_/js/k+oz.gapi.fi.SYxU0C_41cA.O/m+__features__/am+AQ/rt+j/d+1/t+zcms/rs+AGLTcCN6vod5mWx6CTilOJQAzWyzkwEqAg#9956950407942605437 does not permit cross-origin framing.
TypeError: sing is undefined bal.js:931:17
TypeError: site is null DirectoryLinksProvider.jsm:504:13
Sivusto käyttää SHA-1 -varmennetta. On suositeltua käyttää varmenteita, joiden allekirjoitusalgoritmit käyttävät SHA-1:ä vahvempia tiivistefunktioita.[Learn More] uib.ff.avast.com
TypeError: site is null DirectoryLinksProvider.jsm:504:13
about:blank : Unable to run script because scripts are blocked internally.
about:blank : Unable to run script because scripts are blocked internally.
Use of getAttributeNode() is deprecated. Use getAttribute() instead. desktop_module_main.js:83:0
about:blank : Unable to run script because scripts are blocked internally.
about:blank : Unable to run script because scripts are blocked internally.
about:blank : Unable to run script because scripts are blocked internally.
about:blank : Unable to run script because scripts are blocked internally.
about:blank : Unable to run script because scripts are blocked internally.
about:blank : Unable to run script because scripts are blocked internally.
about:blank : Unable to run script because scripts are blocked internally.
about:blank : Unable to run script because scripts are blocked internally.
about:blank : Unable to run script because scripts are blocked internally.
about:blank : Unable to run script because scripts are blocked internally.
Vulnerabilities on website. WordPress: Warning Directory Indexing Enabled
In the test we attempted to list the directory contents of the uploads and plugins folders to determine if Directory Indexing is enabled. This is an information leakage vulnerability that can reveal sensitive information regarding your site configuration or content.
Thank you, Pernaman, as this thread’s contents are also kind of an instruction to those that come to visit here
to be attentive to insecurities.
In that respect our postings are also instructional and educational as it is again the same errors that are being made,
outdated server software and misconfigurations or bad settings, outdated, unpatched and even left content managment software that even could better be retired. User enumeration enabled, directory listings enabled, excessive server header info proliferation, PHP vulnerabilities, clickjacking vulnerabilities, XSS exploitable code to mention the most prevailing issues.
Those that follow the cold reconnaissance third party website scan postings here, will now know not to make these basic mistakes anymore.
The usual way I notice these things is by checking out some of stuff I post here is checking websites I visit in online scanners out of curiosity/doubt, or when I notice something weird when visiting sites. Part of this could be my general anxiety/slight possible cyberphobia. But nothingless I as much as anyone I like being more secure on the web, though it migh make me paranoid in eyes of some people, since I usually worry about security of my PC even with all antivirus/malware & browser security tools I use. :-[ Byt notheless I most of all try to do my part keeping web browsing safe for everyone else and myself.
While doing this you get more and more experience and your insights and your online security will only grow!
I have learned to not accept things while others say so, but always check whether I am right or wrong myself.
That is why third party cold reconnaisance scanning in a sandbox environment is so rewarding.
You are never to access the suspicious or malicious websites directly yourself, but use third party scan results in stead.
Sometimes these can also come blocked as sometimes too much of (mal)code is being detected (often without any payload, but nevertheless).
There is also a special Mozilla browser to do this scanning and it is called Malzilla (a wonderful concept).
Download and try it and load that suspicious url there (yes it is sandboxed by design ).
Well, or read through my “musings thread” in the general section of this forum, where I give some more examples, like http://fetch.scritch.org/ and working a websites source code through for instance Redlegs fileviewer via a web proxy.
So you see what we are doing here really makes sense and the follow up of it really brings advanced security to both those of the website and those that come to visit it. So keep reporting your issues, please
We try to get enhanced awareness, it is a very slow process, but as here in this case we make progress into the right direction trying to make the website landscape online a tiny bit more secure.
Too bad to return to this issue, but seemingly Noscript gave another XSS alert from this website when browsing some of it’s older videos with seemingly different flash player than more recent content. Here’s what console gave me: