Malware Detected Webhook
When a daily scan results in file or page malware for a Website
, the details will be sent via webhook. See the Webhook Events Overview for more general information.
ID: Webhook ID
Event: website_malware_issue_found
Target: Includes unqiue Website
ID as id
Body: A report
with an array of type
and description
pairs and a report_date
with the time the report was generated in ISO 8601 format. The description
is an English, human-readable message describing what was found or referencing a specific file or page on the website.
Example
{
"id":123456,
"event":"website_malware_issue_found",
"target":{
"type":"Website",
"id":123456
},
"body":{
"report_date":"2020-08-14",
"report":[
{
"type":"Malware Page",
"description":"http://www.vulnerablesite.com/abadpage.php"
},
{
"type":"Platform Vulnerability",
"description":"WordPress 2.9.2-4.8.1 - Open Redirect -- Open redirect attack possible on User and Term edit screens."
},
{
"type":"Platform Vulnerability",
"description":"WordPress 2.5-4.6 - Authenticated Stored Cross-Site Scripting via Image Filename -- Authenticated Stored Cross-Site Scripting vulnerability via Image Filename in WordPress versions 2.5 to 4.6 allows authenticated users to inject malicious code to the database."
},
{
"type":"Platform Vulnerability",
"description":"WordPress 4.2-4.7.2 - Press This CSRF DoS -- CSRF DoS vulnerability in WordPress versions 4.2 to 4.7.2 through the Press This functionality."
},
{
"type":"Malware File",
"description":"public_html/tomsaplustreeservice/wp-admin/maint/repair.php"
},
{
"type":"Malware File",
"description":"public_html/2014backup/administrator/help/en-GB/screen.modules.new.html"
},
{
"type":"Malware File",
"description":"tmp/xploit.sh"
}
]
}
}