ImmunifyAV (Antivirus) on my server displays errors on my 3 Sellerdeck websites.
These are all .HTML files and the error is SMW-INJ-27348-js.spam.polyfill-3
Looking at these .HTML files, they contain the code:
Is this code used by Sellerdeck, or has it been injected by a bad actor?
If it is Sellerdeck code, is it a false positive?
See here for more information: https://blog.imunify360.com/new-sign...y-chain-attack
These are all .HTML files and the error is SMW-INJ-27348-js.spam.polyfill-3
Looking at these .HTML files, they contain the code:
Code:
/***********************************************************************
*
* polyFillsLoaded - called when the Poly Fill JS bundle has loaded
* Note the defer attribute so that it only runs after the page is loaded
* PolyFills are required to support Fetch and promises in IE11
*
************************************************************************/
function polyFillsLoaded()
{
$(".usesFetch").show();
}
</script><script defer crossorigin="anonymous" src="https://polyfill.io/v3/polyfill.min.js?flags=gated&callback=polyFillsLoaded&features=fetch,Promise"></script><script id="mcjs">
$(document).ready(function() {
!function(c,h,i,m,p){m=c.createElement(h),p=c.getElementsByTagName(h)[0],m.async=1,m.src=i,p.parentNode.insertBefore(m,p)}(document,"script","https://chimpstatic.com/mcjs-connected/js/users/232dc7ee9d33fb3fd969b664e/6a46af04e6ae92f29264ef2ed%2Ejs");
});
</script
If it is Sellerdeck code, is it a false positive?
See here for more information: https://blog.imunify360.com/new-sign...y-chain-attack
Comment