https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6188

           Summary: ISO-2022-JP false positives on OBFUSCATING_COMMENT
           Product: Spamassassin
           Version: 3.3.0
          Platform: Other
        OS/Version: All
            Status: NEW
          Severity: major
          Priority: P5
         Component: Rules
        AssignedTo: dev@spamassassin.apache.org
        ReportedBy: wtog...@redhat.com


http://ruleqa.spamassassin.org/20090831-r809502-n/OBFUSCATING_COMMENT/detail
OBFUSCATING_COMMENT is triggering abnormally large amounts with ISO-2022-JP
encoded mail.

rawbody __OBFUSCATING_COMMENT_A /\w(?:<![^>]*>)+\w/
rawbody __OBFUSCATING_COMMENT_B /[^\s>](?:<![^>]*>)+[^\s<]/
meta OBFUSCATING_COMMENT        ((__OBFUSCATING_COMMENT_A && HTML_MESSAGE) ||
(__OBFUSCATING_COMMENT_B && MIME_HTML_ONLY))
describe OBFUSCATING_COMMENT    HTML comments which obfuscate text

If I'm reading these regex correctly, it is looking for <! comment tags in the
middle of words or non-whitespace?

But if spamassassin (by default) does not decode the body of mail, then
<![^>]*> can be valid text in the body that is not parsed by the HTML parser,
since it is recognized as ISO-2022-JP formatted text.

-- 
Configure bugmail: 
https://issues.apache.org/SpamAssassin/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

Reply via email to