Server IP : 85.214.239.14 / Your IP : 3.137.219.221 Web Server : Apache/2.4.62 (Debian) System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64 User : www-data ( 33) PHP Version : 7.4.18 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, MySQL : OFF | cURL : OFF | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : OFF Directory : /usr/share/perl5/Mail/SpamAssassin/Plugin/ |
Upload File : |
# <@LICENSE> # Licensed to the Apache Software Foundation (ASF) under one or more # contributor license agreements. See the NOTICE file distributed with # this work for additional information regarding copyright ownership. # The ASF licenses this file to you under the Apache License, Version 2.0 # (the "License"); you may not use this file except in compliance with # the License. You may obtain a copy of the License at: # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # </@LICENSE> package Mail::SpamAssassin::Plugin::HTTPSMismatch; use Mail::SpamAssassin::Plugin; use Mail::SpamAssassin::Logger; use Mail::SpamAssassin::Constants qw(:ip); use strict; use warnings; # use bytes; use re 'taint'; our @ISA = qw(Mail::SpamAssassin::Plugin); # constructor: register the eval rule sub new { my $class = shift; my $mailsaobject = shift; # some boilerplate... $class = ref($class) || $class; my $self = $class->SUPER::new($mailsaobject); bless ($self, $class); # the important bit! $self->register_eval_rule ("check_https_http_mismatch", $Mail::SpamAssassin::Conf::TYPE_BODY_EVALS); return $self; } # [lt]a href="http://baboz-njeryz.de/"[gt]https://bankofamerica.com/[lt]/a[gt] # ("<" and ">" replaced with "[lt]" and "[gt]" to avoid Kaspersky Desktop AV # false positive ;) sub check_https_http_mismatch { my ($self, $pms, undef, $minanchors, $maxanchors) = @_; $minanchors ||= 1; foreach my $html (@{$pms->{html_all}}) { my $hit = 0; my $anchors = 0; foreach my $k (keys %{$html->{uri_detail}}) { my $v = $html->{uri_detail}->{$k}; # if the URI wasn't used for an anchor tag, or the anchor text didn't # exist, skip this. next unless exists $v->{anchor_text} && @{$v->{anchor_text}}; my $uri; if ($k =~ m@^https?://([^/:?#]+)@i) { $uri = $1; # Skip IPs since there's another rule to catch that already if ($uri =~ IS_IP_ADDRESS) { $uri = undef; next; } # want to compare whole hostnames instead of domains? # comment this next section to the blank line. $uri = $self->{main}->{registryboundaries}->trim_domain($uri); my $domain = $self->{main}->{registryboundaries}->uri_to_domain($uri); $uri = undef unless $self->{main}->{registryboundaries}->is_domain_valid($domain); } next unless $uri; $anchors++ if exists $v->{anchor_text}; foreach (@{$v->{anchor_text}}) { if (m@https://([^\s/:?#]+)@i) { my $https = $1; # want to compare whole hostnames instead of domains? # comment this next section to the blank line. if ($https !~ IS_IP_ADDRESS) { $https = $self->{main}->{registryboundaries}->trim_domain($https); $https = undef unless $self->{main}->{registryboundaries}->is_domain_valid($https); } next unless $https; dbg("https_http_mismatch: domains $uri -> $https"); next if $uri eq $https; $hit = 1; last; } } } dbg("https_http_mismatch: anchors $anchors"); return 1 if $hit && $anchors >= $minanchors && (!defined $maxanchors || $anchors < $maxanchors); } return 0; } 1;