>it appears that it is showing the sha256 of the .html file 

yes, the javascript is in the html file - - the fault is "javascript used 
in html", not the base64 encoded javascript part

>That means that the sha256 that shows in the log is different each time 
and can't be use for the exception.

yes, like expected , if the content is change the hash will change

>vs just the portion of javascript that is being detected.

this is an image/gif - what should be bad with this file ???????

changelog : ... The native Base64 parts are decoded and analyzed like 
every other attachment. ....

>I know I don't want to use a UserAttach exception for the sending email 
address,

no luck

>Is there a way that I can allow the javascript code (which is constant 
and in an ever changing html file) through using sha256 or another method, 
but still block all other html files with javascript embedded?

define the :CSC exception for sender and recipient
and
write your own code to detect javascript and call this code using 
$ASSP_AFC::checkExeExternal or $ASSP_AFC::checkExeExternalForce (both 
documented in the ASSP_AFC code and called in sub isAnExe)

or something like : npRe in combination with BlockNPExes

>quick question - before I dig deeper, did the previous AFC plugin not 
block javascript in HTML at all?  

only for some special cases

>before I dig deeper

I don't want to - but possibly other list members.

Thomas




Von:    "K Post" <nntp.p...@gmail.com>
An:     "ASSP development mailing list" <assp-test@lists.sourceforge.net>
Datum:  31.10.2022 19:20
Betreff:        Re: [Assp-test] Allowing certain javascript in HTML to 
pass



quick question - before I dig deeper, did the previous AFC plugin not 
block javascript in HTML at all?  

On Mon, Oct 31, 2022 at 10:21 AM K Post <nntp.p...@gmail.com> wrote:
The new AFC is blocking a nightly report that comes in HTML format with 
javascript in it -- as I would expect, but before his new AFC, they were 
erroneously slipping through.

I don't know why these reports weren't being blocked before, it's basic 
HTML with a short block of javascript at the end.  Of note, the javascript 
starts like this and has a base64 image in its code - something that the 
new AFC addresses:

<script type="text/javascript">
    var iX = 0; var iY = 0; var iX = 0; var iY = 0;
    var charting_img = "data:image/gif;base64, -- base 64 is here in real 
code ==";
    var iCurrent = "";
    var images = document.getElementsByTagName('imgs');

So it looks like the new AFC works much better.  Great.
 
Now I need an exception to allow these nightly reports through again. 
Ordinarily, I'd allow the sha256 of the detected blocked file to allow the 
code through, but in looking at the logs, it appears that it is showing 
the sha256 of the .html file itself vs just the portion of javascript that 
is being detected.  That means that the sha256 that shows in the log is 
different each time and can't be use for the exception.

Is there a way that I can allow the javascript code (which is constant and 
in an ever changing html file) through using sha256 or another method, but 
still block all other html files with javascript embedded?

I don't have control of the sending server.  I know I don't want to use a 
UserAttach exception for the sending email address, as that's used for 
many other messages (frustratingly so).

I don't want an exception to allow html with javascript for the receiving 
users regardless of the sender, that would be too much of a risk.

Thanks


[Anhang "attsu7e8.txt" gelöscht von Thomas Eckardt/eck] [Anhang 
"att94tan.txt" gelöscht von Thomas Eckardt/eck] 


_______________________________________________
Assp-test mailing list
Assp-test@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/assp-test

Reply via email to