Server IP : 172.67.216.182 / Your IP : 108.162.226.191 Web Server : Apache System : Linux krdc-ubuntu-s-2vcpu-4gb-amd-blr1-01.localdomain 5.15.0-142-generic #152-Ubuntu SMP Mon May 19 10:54:31 UTC 2025 x86_64 User : www ( 1000) PHP Version : 7.4.33 Disable Function : passthru,exec,system,putenv,chroot,chgrp,chown,shell_exec,popen,proc_open,pcntl_exec,ini_alter,ini_restore,dl,openlog,syslog,readlink,symlink,popepassthru,pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,imap_open,apache_setenv MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /usr/share/perl5/Mail/SpamAssassin/Plugin/ |
Upload File : |
# <@LICENSE> # Licensed to the Apache Software Foundation (ASF) under one or more # contributor license agreements. See the NOTICE file distributed with # this work for additional information regarding copyright ownership. # The ASF licenses this file to you under the Apache License, Version 2.0 # (the "License"); you may not use this file except in compliance with # the License. You may obtain a copy of the License at: # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # </@LICENSE> package Mail::SpamAssassin::Plugin::HTTPSMismatch; use Mail::SpamAssassin::Plugin; use Mail::SpamAssassin::Logger; use Mail::SpamAssassin::Constants qw(:ip); use strict; use warnings; # use bytes; use re 'taint'; our @ISA = qw(Mail::SpamAssassin::Plugin); # constructor: register the eval rule sub new { my $class = shift; my $mailsaobject = shift; # some boilerplate... $class = ref($class) || $class; my $self = $class->SUPER::new($mailsaobject); bless ($self, $class); # the important bit! $self->register_eval_rule ("check_https_http_mismatch"); return $self; } # [lt]a href="http://baboz-njeryz.de/"[gt]https://bankofamerica.com/[lt]/a[gt] # ("<" and ">" replaced with "[lt]" and "[gt]" to avoid Kaspersky Desktop AV # false positive ;) sub check_https_http_mismatch { my ($self, $permsgstatus, undef, $minanchors, $maxanchors) = @_; my $IP_ADDRESS = IP_ADDRESS; $minanchors ||= 1; if (!exists $permsgstatus->{chhm_hit}) { $permsgstatus->{chhm_hit} = 0; $permsgstatus->{chhm_anchors} = 0; foreach my $k ( keys %{$permsgstatus->{html}->{uri_detail}} ) { my %uri_detail = %{$permsgstatus->{html}->{uri_detail}}; my $v = ${uri_detail}{$k}; # if the URI wasn't used for an anchor tag, or the anchor text didn't # exist, skip this. next unless (exists $v->{anchor_text} && @{$v->{anchor_text}}); my $uri; if ($k =~ m@^https?://([^/:]+)@i) { $uri = $1; # Skip IPs since there's another rule to catch that already if ($uri =~ /^$IP_ADDRESS+$/) { undef $uri; next; } # want to compare whole hostnames instead of domains? # comment this next section to the blank line. $uri = $self->{main}->{registryboundaries}->trim_domain($uri); undef $uri unless ($self->{main}->{registryboundaries}->is_domain_valid($uri)); } next unless $uri; $permsgstatus->{chhm_anchors}++ if exists $v->{anchor_text}; foreach (@{$v->{anchor_text}}) { if (m@https://([^/:]+)@i) { my $https = $1; # want to compare whole hostnames instead of domains? # comment this next section to the blank line. if ($https !~ /^$IP_ADDRESS+$/) { $https = $self->{main}->{registryboundaries}->trim_domain($https); undef $https unless ($self->{main}->{registryboundaries}->is_domain_valid($https)); } next unless $https; dbg("https_http_mismatch: domains $uri -> $https"); next if $uri eq $https; $permsgstatus->{chhm_hit} = 1; last; } } } dbg("https_http_mismatch: anchors ".$permsgstatus->{chhm_anchors}); } return ( $permsgstatus->{chhm_hit} && $permsgstatus->{chhm_anchors} >= $minanchors && (defined $maxanchors && $permsgstatus->{chhm_anchors} < $maxanchors) ); } 1;