Server IP : 23.254.227.96 / Your IP : 216.73.216.41 Web Server : Apache/2.4.62 (Unix) OpenSSL/1.1.1k System : Linux hwsrv-1277026.hostwindsdns.com 4.18.0-477.13.1.el8_8.x86_64 #1 SMP Tue May 30 14:53:41 EDT 2023 x86_64 User : viralblo ( 1001) PHP Version : 8.1.31 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /proc/self/root/usr/share/perl5/vendor_perl/Mail/SpamAssassin/Plugin/ |
Upload File : |
# <@LICENSE> # Licensed to the Apache Software Foundation (ASF) under one or more # contributor license agreements. See the NOTICE file distributed with # this work for additional information regarding copyright ownership. # The ASF licenses this file to you under the Apache License, Version 2.0 # (the "License"); you may not use this file except in compliance with # the License. You may obtain a copy of the License at: # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # </@LICENSE> package Mail::SpamAssassin::Plugin::URIEval; use Mail::SpamAssassin::Plugin; use Mail::SpamAssassin::Logger; use strict; use warnings; # use bytes; use re 'taint'; our @ISA = qw(Mail::SpamAssassin::Plugin); # constructor: register the eval rule sub new { my $class = shift; my $mailsaobject = shift; # some boilerplate... $class = ref($class) || $class; my $self = $class->SUPER::new($mailsaobject); bless ($self, $class); # the important bit! $self->register_eval_rule("check_for_http_redirector"); $self->register_eval_rule("check_https_ip_mismatch"); $self->register_eval_rule("check_uri_truncated"); return $self; } ########################################################################### sub check_for_http_redirector { my ($self, $pms) = @_; foreach ($pms->get_uri_list()) { while (s{^https?://([^/:\?]+).+?(https?:/{0,2}?([^/:\?]+).*)$}{$2}i) { my ($redir, $dest) = ($1, $3); foreach ($redir, $dest) { $_ = $self->{main}->{registryboundaries}->uri_to_domain($_) || $_; } next if ($redir eq $dest); dbg("eval: redirect: found $redir to $dest, flagging"); return 1; } } return 0; } ########################################################################### sub check_https_ip_mismatch { my ($self, $pms) = @_; while (my($k,$v) = each %{$pms->{html}->{uri_detail}}) { next if ($k !~ m%^https?:/*(?:[^\@/]+\@)?\d+\.\d+\.\d+\.\d+%i); foreach (@{$v->{anchor_text}}) { next if (m%^https:/*(?:[^\@/]+\@)?\d+\.\d+\.\d+\.\d+%i); if (m%https:%i) { keys %{$self->{html}->{uri_detail}}; # resets iterator, bug 4829 return 1; } } } return 0; } ########################################################################### # is there a better way to do this? sub check_uri_truncated { my ($self, $pms) = @_; return $pms->{'uri_truncated'}; } 1;