Synopsis
Nessus detected malicious binaries being hosted on the remote web site.
Description
The MD5 sum of one or more binaries hosted on the remote web server matches known malware. This may indicate that the remote site was compromised.
Note that Nessus has only scanned files with the following extensions :
exe , dll , scr , drv , sys , bat , cmd , com , cpl , csh , gadget , application , hta , inf , ins , inx , isu , job , jse , lnk , msc , msi , msp , mst , paf , pif , ps1 , ps1xml , ps2 , ps2xml , psc1 , psc2 , reg , rgs , sct , scf , shb , shs , u3p , vb , vbs , vbe , vbscript , ws , wsf , chm , jar , class , js , jse , swf , pdf , jsp , php , jpeg , jpg , asp , doc , docx , ppt , pptx , xls , xlsx
Solution
Delete the offending file(s).
Plugin Details
File Name: www_hosting_malware.nbin
Supported Sensors: Nessus
Risk Information
CVSS Score Rationale: The detection is suspected as being malware.
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: manual
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L