Hi Jon, without meaningful descriptions there’s nothing to go on there. It looks to me that the detection is using a crude algorithm that doesn’t amount to anything.
I’ve had SiteLock for a while on Bluehost, just renewed and it seems that since then SiteLock has become very noisy in the alerts in sends out to me. I’ll try and get some info on the descriptions…
Hi Jon, it will be interesting to see what descriptions they can provide.
Those parameters listed (a, c, m, p1 and p2) are Backlight’s mechanism for handling application routing. For example, a link such as /backlight/publisher/admin/view_album/100 will be mapped by the .htaccess file to m=publisher, c=admin, a=view_album and p1=100 where m means module, c means the controller (the part of the module that’s processing the request), a means action and p1 means parameter one.
While this exact mapping convention is specific to Backlight, it’s a common approach to building web application frameworks, and doesn’t represent anything worth flagging from a security perspective.
I have just had this excellent and Informative (not!) reply from SiteLock support, to which I fired back a reply (not to be repeated in polite company). But just so you know this is it:
Dear Jon,
Thank you for your recent inquiry. The Vulnerability scan result description is providing you the Javascript expression and objective. This would be looked at by a developer versed in Javascript to interpret. You can learn more about javascript objections and expressions at this link here,
Typically, if you’re using any Javascript based applications or plugins. You may simply need to update them inside your CMS tool.
I the meantime, does anyone have any suggestions as to an alternate hosting company if I wanted to move from Bluehost and are there any other products I could use for site security other than SiteLock?
So here’s the fianl reply from SiteLock, not very helpful and a bit bullish. Listed for information only;
Thank you for your recent inquiry. We recommend having any vulnerability concern you may have reviewed by your website or application developer. The Vulnerability Scan is a feature of our security services. However we do not support your specific website or vulnerability issue. The recommendations provided previously may resolve the issue if you do look into performing updates. We are not able to remove the files from our scan database as it does pose a vulnerability.
Not sure there is anything that can be done with this, looks like I’m off to a new provider when this expires…
I have been with them for close to ten years and the service has been perfect. They are in Salt Lake City, UT. They have 24/7 tech support and you can reach a real, live person via phone or chat, never having to wait more than a couple of minutes in a queue.