SA Bugzilla – Bug 7857
<a data-saferedirecturl="">
Last modified: 2020-09-21 19:56:38 UTC
Please consider making SA aware of the data-saferedirecturl html tag for URI lookups. This is "hiding" phish,generic spam are a google redirect- Sample of such case will follow
sample URI: <a href="https://example.com/very/legit/url" target="_blank" rel="noreferrer" data-saferedirecturl="https://www.google.com/url?q=https://example.org/very/evil/url&source=gmail&ust=123456789/*&usg=laksjdflasi">Update user@example.com now</a>
Good catch, AXB.
underway
Modified: trunk/lib/Mail/SpamAssassin/HTML.pm Added: trunk/t/uri_saferedirect.t Committed revision 1881911.
Do we want to backport this to 3.4?
(In reply to John Hardin from comment #5) > Do we want to backport this to 3.4? if you can, that would be great,
Modified: branches/3.4 Modified: branches/3.4/lib/Mail/SpamAssassin/HTML.pm Added: branches/3.4/t/uri_saferedirect.t Committed revision 1881912.
Thanks for the backport. How safe do you feel the change is?
Nevermind, I see it now. A test and a 3 line patch +1 for 3.4
I just noticed an apparent error in the antipatterns in the test script that I cloned: 185 invalid_ltd.foo !invalid_tld 186 invalid_ltd.bar !invalid_tld 187 invalid_ltd.xyzzy !invalid_tld 188 invalid_ltd.co.zz !invalid_tld 189 190 www.invalid_ltd.foo !invalid_tld 191 www.invalid_ltd.bar !invalid_tld 192 www.invalid_ltd.xyzzy !invalid_tld 193 www.invalid_ltd.co.zz !invalid_tld Shouldn't the "_ltd" / "_tld" bit match to ensure the invalid TLD is not captured as a URI? Or are these essentially NOP'd out by mangling because SA is not doing valid-TLD filtering? If so, should these be explicitly commented out instead of being mangled so they pass? Like this antipattern: 222 #keyword:sportscar !sportscar The SVN history shows it's been that way since the initial commit.