Jump to content

Debug website threat detection


Recommended Posts

Hello, my website has been detectet as site what include JS/Spy.Banker.IV trojan. We got problem with this in past but the website should be clean now. But the eset still detect it as threat. Is any possibility to get some debug log or extra verbose debug message what exact part of webpage is detected ? The error is just in the checkout page so I am not able to check it with free tools because it is require registration to access the checkout page. Thanks

Link to comment

https://emotors.cz/cs/objednavka  -    but this page require to have some product in cart. If you dont you are redirected to cart.

Link to comment

I searched whole sourcodes, also searched the all loaded resources at that page for "var_***" and nothing found :( I am totaly lost. 

Link to comment
  • Administrators

It could be injected into clean checkout pages at runtime.

Do you use the latest version of Prestashop? Asking because of this vulnerability:

https://build.prestashop-project.org/news/2022/major-security-vulnerability-on-prestashop-websites/

https://www.prestashop.sk/blog/clanok/zavazna-bezpecnostna-chyba-prestashopu-1.7-a-1.6

Link to comment

Ok. For some reason the clean install of chrome automaticali remove the malicious script from the website without notification. If I try debug it in the firefox I was able to remove it completly from website. Thanks for the help anyway.

Link to comment
Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...