Tim,
  yes... I might implement your approach if we start getting too
many false positives.  I'd refine it a bit though, at least like
this 

/http:\/\/\S*(%3c|<)(s|%53|%73)(c|%43|%63)(r|%52|%72)(i|%49|%69)(p|%50|%70)(t|%54|%74)(%20|\+)(l|%4c|%6c)(a|%41|%61)(n|%4e|%6e)(g|%47|%67)/i

but then I'm not sure whether there may be other ways for invoking
javascript from an URL.

-- Norbert.


Tim Pierce <[EMAIL PROTECTED]> wrote:

> On Fri, Jun 01, 2001 at 01:00:40AM +0200, Norbert Bollow wrote:
> > Here is a new type of possible malware that is not stopped by
> > standard demime/attachment stripping.
> > 
> > I have just added a check for the regular expression
> > 
> > /https?:\S*(%3a|\:)(%2f|\/)(%2f|\/)/i
> 
> I would probably use this instead:
> 
> http://\S*(%3c|<)script(%20|\+)language
> 
> Legitimate redirector URLs will include strings like %2F%2F.
> URL-escaped code for invoking JavaScript is much less likely to
> appear inside a benign message.
> 

Reply via email to