Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bootstrap-table.js notifi Virus name: PUA.Win.Trojan.Xored-1 #15826

Open
2 tasks done
namdoan91 opened this issue Nov 15, 2024 · 5 comments
Open
2 tasks done

Bootstrap-table.js notifi Virus name: PUA.Win.Trojan.Xored-1 #15826

namdoan91 opened this issue Nov 15, 2024 · 5 comments

Comments

@namdoan91
Copy link

namdoan91 commented Nov 15, 2024

Debug mode

Describe the bug

After logging in, the interface currently fails to load" or "After logging in, the interface is not loading anymore
Screenshot 2024-11-15 at 14 01 43

Reproduction steps

  1. Go to login web
  2. Go to Dashboard

...

Expected behavior

Upon checking, I found that this path "http://IP-SnipeIT/js/dist/bootstrap-table.js?id=b4c3069f1a292527a96c058b77b28d69" is suspected to be a virus
Screenshot 2024-11-15 at 14 04 20

Screenshots

No response

Snipe-IT Version

7.1.14

Operating System

Ubuntu

Web Server

Apache

PHP Version

8.1.2

Operating System

No response

Browser

No response

Version

No response

Device

No response

Operating System

No response

Browser

No response

Version

No response

Error messages

No response

Additional context

No response

Copy link

welcome bot commented Nov 15, 2024

👋 Thanks for opening your first issue here! If you're reporting a 🐞 bug, please make sure you include steps to reproduce it. We get a lot of issues on this repo, so please be patient and we will get back to you as soon as we can.

@snipe
Copy link
Owner

snipe commented Nov 15, 2024

Well that's a first. Definitely not a virus, it's the javascript library that loads all of the tables. Is there a way to ignore that in your ClamAV?

@snipe
Copy link
Owner

snipe commented Nov 15, 2024

Looks like ClamAV has a history of false positives with JS.

jensyt/imurmurhash-js#1
https://askubuntu.com/questions/1006237/clamav-detects-trojans

I can try to open an issue on the Bootstrap Table repo and ask them to submit to VirusTotal and submit a false positive report.

Ask Ubuntu
I have just scanned my system and clamav has detected a few suspect files:

File: .cahe/mozilla/firefox/jqxk4r44.default/cache2/entries/750B6E2F1286....
Status: PUA.Win.Exploit.CVE_2012_1461-1

Fil...

@namdoan91
Copy link
Author

Well that's a first. Definitely not a virus, it's the javascript library that loads all of the tables. Is there a way to ignore that in your ClamAV?

Yes, as you said, it's a fake virus alert, but I'm also trying to bypass it! I haven't found a way locally yet. If you know, could you help me?

@namdoan91
Copy link
Author

namdoan91 commented Nov 16, 2024

Looks like ClamAV has a history of false positives with JS.

jensyt/imurmurhash-js#1 https://askubuntu.com/questions/1006237/clamav-detects-trojans

I can try to open an issue on the Bootstrap Table repo and ask them to submit to VirusTotal and submit a false positive report.

Ask Ubuntu**Clamav detects Trojans**I have just scanned my system and clamav has detected a few suspect files:
File: .cahe/mozilla/firefox/jqxk4r44.default/cache2/entries/750B6E2F1286....
Status: PUA.Win.Exploit.CVE_2012_1461-1
Fil...

According to VirusTotal, when scanning the JS file, ClamAV does not recognize it as a virus.
Screenshot 2024-11-16 at 07 41 16

Ask Ubuntu
I have just scanned my system and clamav has detected a few suspect files:

File: .cahe/mozilla/firefox/jqxk4r44.default/cache2/entries/750B6E2F1286....
Status: PUA.Win.Exploit.CVE_2012_1461-1

Fil...

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants