Internet Explorer URL Display problem

Ken Anderson ka at PACIFIC.NET
Mon Dec 15 18:46:30 GMT 2003


Seeing a false positive from a weatherbug spam using this re.
 > /%([01][0-9a-f]|7f).*@/i

It's coming from this mailto link:

mailto:community at isabel.weatherbug.com?Subject=Photo%20Submission&Body=Step%201%20-%20Safely%20take%20photos%20you%27d%20like%20to%2
0share%20with%20the%20community%20before%2C%20during%20or%20after%20the%20storm.%0D%0A%0D%0AStep%202%20-%20Send%20this%20email%20wit
h%20your%20photos%20attached%20to%3A%20community at isabel.weatherbug.com

Any ideas?

Thanks,
Ken A.
Pacific.Net







Julian Field wrote:

> At 17:29 12/12/2003, you wrote:
>
>> At 17:09 12/12/2003, you wrote:
>>
>>> On Fri, 2003-12-12 at 03:47, Randal, Phil wrote:
>>> > RFC 2396 (http://www.faqs.org/rfcs/rfc2396.html) generalises URIs.
>>>
>>> I only skimmed the spec. But what I gathered, unless I completely
>>> misunderstood the document is that characters from %00 through %1F
>>> inclusive and %7F are control characters and shouldn't be in a URI.
>>>
>>>    Although they are disallowed within the URI syntax, we include here a
>>>    description of those US-ASCII characters that have been excluded and
>>>    the reasons for their exclusion.
>>>
>>>    The control characters in the US-ASCII coded character set are not
>>>    used within a URI, both because they are non-printable and because
>>>    they are likely to be misinterpreted by some control mechanisms.
>>>
>>>    control     = <US-ASCII coded characters 00-1F and 7F hexadecimal>
>>>
>>> So how much trouble would we cause if we just disallowed the entire
>>> range of control characters from URIs? Can anyone think of a real
>>> website
>>> that legitimately uses any of these control codes within their URIs? I'm
>>> particularly concerned about shopping sites with their massive URIs.
>>
>>
>> Sounds good to me.
>
>
> The pattern for matching this is therefore
>
> /%([01][0-9a-f]|7f).*@/i
>
> so add this to spam.assassin.prefs.conf:
>
> uri     IE_VULN                 /%([01][0-9a-f]|7f).*@/i
> score   IE_VULN                 100.0
> describe        IE_VULN         Internet Explorer vulnerability
>
> and then restart MailScanner.
> --
> Julian Field
> www.MailScanner.info
> Professional Support Services at www.MailScanner.biz
> MailScanner thanks transtec Computers for their support
> PGP footprint: EE81 D763 3DB0 0BFD E1DC 7222 11F6 5947 1415 B654
>
>



More information about the MailScanner mailing list