ImmunifyAV (Antivirus) on my server displays errors on my 3 Sellerdeck websites.
These are all .HTML files and the error is SMW-INJ-27348-js.spam.polyfill-3
Looking at these .HTML files, they contain the code:
Is this code used by Sellerdeck, or has it been injected by a bad actor?
If it is Sellerdeck code, is it a false positive?
See here for more information: https://blog.imunify360.com/new-sign...y-chain-attack
These are all .HTML files and the error is SMW-INJ-27348-js.spam.polyfill-3
Looking at these .HTML files, they contain the code:
Code:
/*********************************************************************** * * polyFillsLoaded - called when the Poly Fill JS bundle has loaded * Note the defer attribute so that it only runs after the page is loaded * PolyFills are required to support Fetch and promises in IE11 * ************************************************************************/ function polyFillsLoaded() { $(".usesFetch").show(); } </script><script defer crossorigin="anonymous" src="https://polyfill.io/v3/polyfill.min.js?flags=gated&callback=polyFillsLoaded&features=fetch,Promise"></script><script id="mcjs"> $(document).ready(function() { !function(c,h,i,m,p){m=c.createElement(h),p=c.getElementsByTagName(h)[0],m.async=1,m.src=i,p.parentNode.insertBefore(m,p)}(document,"script","https://chimpstatic.com/mcjs-connected/js/users/232dc7ee9d33fb3fd969b664e/6a46af04e6ae92f29264ef2ed%2Ejs"); }); </script
If it is Sellerdeck code, is it a false positive?
See here for more information: https://blog.imunify360.com/new-sign...y-chain-attack
Comment